Is your endpoint defense good enough?

Endpoints are the new cybersecurity war front.

Whether it is computers, servers, virtual machines or mobile devices, endpoint security matters!

A simple misconfiguration, lack of an update, human error or operating in an unsecured environment (like a coffee shop) can pry open the best-laid network defenses vulnerable. The lack of knowledge, inconvenience or an assumption that their endpoint security is enough to deter are reasons why it is becoming a favorite attack vector for hackers.

Rewiring thinking

Gartner believes it is time to refocus on endpoint security.

In its Market Guide for Endpoint Detection and Response Solutions report, the analyst firm urged security teams to move detection mechanism to "move up the stack." They noted endpoint detection and response (EDR) solutions must detect “fileless malicious activities that use memory exploits and take advantage of Windows utilities such as Powershell.”

EDR also needs to keep up with the fast evolution of tactics, techniques and procedures among endpoint hackers (collectively called TTPs). Gartner highlights the importance for EDR solutions able to respond better to increasingly sophisticated TTPs.

Meanwhile, EDR solutions can employ data mining techniques to help security teams understand how attackers are evolving their tradecraft while integrating with endpoint protection platform (EPP) solutions for better visibility and response. 

EDR woes

While the case for upgrading EDR is clear, deploying the right solution is not a simple feat.

First, EDR must be scalable. As endpoint devices proliferate in today's data-driven, cloud-first environment, many solutions risk drowning in the data deluge. It is why Gartner believes that cloud-based deployments will become popular as it offers immediate access to computing and storage resources that EDR needs to manage data.

EDR operates in near real-time to be useful, should integrate easily with other security systems to offer a holistic viewpoint. They also need to go beyond signature-based protection that are dependent on the comprehensiveness of the signature database, can be easily foiled by changing attack methods and can lead to false positives.

However, the biggest hurdle is talent. EDR requires the right technical know-how and deep expertise who can turn information into actionable insights – a difficult proposition in today’s lean time and constant talent struggle. 

Integrated approach

FireEye Endpoint Security offers a different proposition. By combining both EDR and EPP into a single solution, it aims to help firms detect threats that current solutions overlook.

Essentially, it offers a single solution that integrates anti-virus and anti-malware protection, threat intelligence, behavior analysis and endpoint detection and response (EDR) capabilities. Through this integration, the solution can detect, identify and contain threats on thousands of endpoint (connected or otherwise) in minutes. Meanwhile, advanced threat intelligence and endpoint behavioral analysis can help security teams to use a single endpoint agent to prevent, detect and respond faster.

Finding out who is attacking your endpoints is simpler. Using the Triage and Audit Viewer features, FireEye Endpoint Security offers a single interface for help security teams to identify and stop incidents for analysis without requiring advanced technical knowledge. Containing a threat for analysis can now be done with a single click.

More importantly, the lessons learned from any attack or incident is now shared across all endpoints. New intelligence from other FireEye products, iSight, and front-end consultants are automatically updated quickly, ensuring your every endpoint is always ready for the next attack.


It is time to shift our mindsets on endpoint security. EDR must evolve to become both the first and last line of defense for any firm.

The good news is that the security community is making it easier to deploy effective EDR. An integrated solution, like FireEye Endpoint Security, allows security teams and SOCs to identify patterns, isolate attacks and even investigate attack TTPs without having in-depth knowledge.


With machine-to-machine communications and IoT devices going mainstream, protecting your endpoints may become more important than ever. 

Original Author: