The Ultimate Guide to Endpoint Detection and Response
2024 edition
Overview
Also known as EDR.
End points are the pointy end of the network and are often quite literally found in the user’s hands – as a laptop, smartphone, or other access device. Endpoints can also include IoT sensors or any other connected item, including printers and other peripherals. Endpoint Detection and Response is the cybersecurity technology responsible for monitoring, detecting, and addressing malware at device level.
Analyst reports
Gartner Peer Insights on EDR & Firewalls
WatchGuard wins TrustRadius awards for cybersecurity
This month
Gartner on EDR & UC
CrowdStrike & Fortinet partner to enhance cybersecurity
Last month
Gartner on EDR & Malware
Check Point Software named Visionary in 2024 Gartner re...
Fri, 27th Sep 2024
Gartner on EDR & Endpoint Protection
CrowdStrike leads Gartner Magic Quadrant for endpoint p...
Thu, 26th Sep 2024
Gartner on EDR & SIEM
Trend Micro leads Gartner's endpoint security magic qua...
Wed, 25th Sep 2024
Reviews
Gaming
Hands-on review: Asus Zenbook S 16 with AMD Ryzen AI 9 ...
Thu, 22nd Aug 2024
Gaming
Hands-on review: ASRock Phantom Gaming Z790 Nova WiFi m...
Wed, 24th Jan 2024
Gadgets
Hands-on review: Intel NUC 12-PRO Wall Street Canyon
Tue, 23rd Jan 2024
PC Hardware
Hands-on review: Intel Core i9-14900K and Intel Core i5...
Tue, 28th Nov 2023
Expert columns
By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Last week
By Steve Katanas of HID
Enhancing data centre security with mobile access contr...
Mon, 30th Sep 2024
By Steve Moros of Proofpoint
The insider threat: Why Australian businesses are most ...
Wed, 25th Sep 2024
By Innes Muir of Logpoint
How MDR will transform cybersecurity in the mid-market
Mon, 16th Sep 2024
By Devasmita Das of ColorTokens
Beyond prevention: Why breach readiness is your cyberse...
Mon, 19th Aug 2024
More expert columns
By Trevor Dearing of Illumio
Why the answer to AI threats is not more AI
Fri, 28th Jun 2024
By Simon Howe of ExtraHop
Cyber risk is keeping the Australian enterprise on its ...
Thu, 6th Jun 2024
By Brad Pulford of HP ANZ
A new kind of PC is coming: From personal computer to i...
Wed, 24th Jan 2024
Top players
Recent news
About Malware
Mouse motion simulators pose potential cyberthreat risk
Last week
About Malware
Kaspersky aids INTERPOL in disrupting global cybercrime
Last week
About Software-as-a-Service
AppOmni partners with Cisco for SaaS zero trust securit...
Last week
About Data Protection
Infinigate & Acronis expand partnership across Europe
This month
About Software-as-a-Service
Igel enhances security with Microsoft solutions support
This month
More news
About EduTech
University of Manchester strengthens cybersecurity meas...
Last month
About Productivity
CrowdStrike partners with Omnissa for enhanced security
Last month
About Endpoint Protection
VIPRE earns 'Strategic Leader' status in 2024 AV report
Last month
About Software Updates
WatchGuard reveals Q2 2024 cyber threat trends report
Last month
About Malware
WatchGuard reveals new malware trends in Q2 2024 report
Last month
Even more news
About Ransomware
Forescout discovers security flaws in DrayTek routers
Last month
About Malware
Halcyon unveils Linux-focused anti-ransomware solution
Last month
About Security Information and Event Management
Logpoint acquires Muninn to bolster AI-driven cybersecu...
Last month
About Endpoint Protection
MSI launches new server platforms with Intel Xeon proce...
Fri, 27th Sep 2024
About Software-as-a-Service
IGEL unveils new service to recover from cyber attacks ...
Thu, 26th Sep 2024
Job moves
Move at RMM
Andre Schindler promoted to SVP at NinjaOne amid growth
Fri, 6th Sep 2024
Move at Bitdefender
WithSecure appoints Samantha Cotton as UK & Ireland cha...
Fri, 16th Aug 2024
Move at IBM
Acronis appoints Andrea Martin to boost NZ & Pacific pr...
Mon, 12th Aug 2024
Move at Tanium
Tanium appoints Rani Johnson, Tim Millikin to board of ...
Fri, 31st May 2024
Move at Rackspace
Paul Tuffs named as Tanium's VP for A/NZ in expansion b...
Tue, 14th May 2024
Other guides
You can read other related guides from Cybersecurity, Advanced Persistent Threat Protection, Artificial Intelligence, Breach Prevention, and Extended Detection and Response.
Powered by