Endpoint Detection and Response (EDR) is a cybersecurity solution that proactively identifies and responds to threats to devices on a network, including desktop PCs, laptop PCs, mobile devices and, in some cases, server endpoints. EDR is used to protect devices against known and unknown malicious attacks.
EDR provides security teams with comprehensive visibility into events on their network’s endpoints at all times by recording, storing, and analyzing that information, then presenting options for remediation.
Endpoints are devices that directly connect to the network and often serve as direct entry points for attackers. They can be physical (laptops, desktop workstations, servers) or virtual (cloud services, web applications, virtual machines).
Endpoints are difficult to defend without full visibility because any one of them could be directly accessed by attackers, who can send them messages and receive data back in return. This communication mechanism is often compromised (by malwareWhat is Malware? Malware, a portmanteau of “malicious software,” constitutes a broad category of software specifically designed to infiltrate, damage, or disrupt computer systems, networks, and devices without the user’s… More, credential theftWhat is Credential Theft? Credential theft is a type of cyberattack in which attackers steal a victim’s login details, such as usernames, passwords, or other forms of authentication. This stolen… More, or phishingWhat is Phishing? Phishing is a type of cyberattack in which attackers send fraudulent communications, or direct people to counterfeit websites in order to trick those individuals into revealing sensitive… More attempts) and grants threat actors access to an organization’s systems, resulting in a ransomwareWhat is Ransomware? Ransomware is a type of cyberattack in which the attacker infects a computer with malicious software that encrypts the victim’s data. The computer usually becomes locked, presenting… More attack, data breachWhat is a Data Breach? A data breach is a security incident in which unauthorized individuals access sensitive, confidential, or protected information. These breaches can occur through various means, including cyberattacks,… More, or in the case of critical infrastructureWhat is Critical Infrastructure? Critical infrastructure refers to the fundamental systems, assets, and facilities that are essential for the functioning of a society and its economy. These are the foundational… More, a crippling cyberattackWhat is a Cyberattack? A cyberattack is a deliberate and malicious attempt to exploit vulnerabilities in computer systems, networks, or software applications to cause damage, steal information, disrupt services, or… More leading to dangerous downtime.
Endpoint detection and response tools serve as a hub for all endpoint-related data, and a control center for delivering alerts and responses to SOCs. It does this in the following ways:
Endpoint detection and response platforms present a favorable alternative to traditional signature-based methods of cybersecurity, which are becoming less popular. Today’s attackers are leveraging subtle, “low-and-slow” attacks that evade traditional defenses by obfuscating their code and using other evasive techniques. To keep up with these exploits, security teams are relying on the automated advanced capabilities that tools like EDR provide.
Want to continue expanding your cybersecurity vocabulary? Get up to speed with this list of over 50 Essential Cybersecurity Acronyms & Definitions.