Top 5 Endpoint Protection Platforms and How to Choose
Endpoint Protection Platforms (EPP) are essential to defend your organization’s workstations, mobile devices, servers and containers. Modern EPP solutions include advanced preventative measures, such as Next-Generation Antivirus which can block both known and unknown malware, and active defensive measures known as Endpoint Detection and Response (EDR).
In this page we’ll help you understand the criteria for selecting and evaluating EPPs, and review the top 5 EPP solutions, breaking down their capabilities into preventive and EDR features.
Scans email attachments, detects and blocks malicious payloads
Prevents unintentional user download of malicious files and drive-by downloads
Enables whitelisting and blacklisting of applications on the endpoint
Monitors behavior of the endpoint and uses machine learning techniques to identify suspicious activity
Endpoint Detection and Response (EDR)
Provides visibility into security incidents on the endpoint and gives security teams the tools to investigate and respond to them
Data Loss Prevention (DLP)
Prevents insider threats focused on data theft and exfiltration attempts by external attackers
Top 5 Endpoint Protection Platforms
1. Symantec Endpoint Protection
Operating system support: Windows 7, 8, 10, Windows Server 2012, 2016, 2019, MacOS, Azure, Amazon Workspaces, VMware WS, ESX, ESXi, XenServer, Oracle VirtualBox
Prevention features: Antivirus, firewall and intrusion prevention, application and device control including file, registry and device access, application whitelisting and blacklisting, automated device erasure, enforcing policy on hosts, system lockdown.
EDR features: Offers Targeted Attack Analytics (TAA) with local and global telemetry, machine learning analysis of device behavior, threat intelligence. Assist with attack investigation, containment and resolution.
Prevention features: Mobile threat defense, security policy management, role-based access control (RBAC), adaptive anomaly control, encryption management, vulnerability and exploit prevention, security for web gateways and email servers, ransomware protection, application control, whitelisting and blacklisting, operating system and third-party software installation.
EDR features (EDR offered as separate product):
Library of automated responses to security incidents, such as wiping and reimaging endpoints.
Proactive Threat Hunting with fast search for threat data, Indicators of Compromise (IoC) search, proactive scanning of endpoints for anomalies
Central visibility and control of incident detection, forensics, prevention activity, and security alerts.
Operating system support: Windows XP, Vista, 7, 8, 10, Windows Server 2003, 2008, 2012, 2016, 2019, any virtualization platform running these operating systems.
Prevention features: Behavior classification for detecting zero-day threats, adaptive scanning for malware and other threats, next-gen anti-malware engine, safe browsing with web protection and filtering, prevents ransomware and grayware, integrated firewall blocks network attacks,
Threat Intelligence Exchange offers intelligence from multiple external and internal security sources
Dynamic Application Containment secures endpoints used as entry points for attacks
Repairs endpoint to last known good state
Actionable forensics helps identify infections and react quickly to contain them
EDR features: Tracks all activity on endpoints, contextualizes and identifies suspicious activity in real time, enables rapid response and rollback to last known good configuration, advanced threat hunting with full context of security incident forensics.
Don’t take vendor claims as a given. Take your EPP solution of choice for a spin before you by. Try some of these to test EPP capabilities for yourself:
Run known malware, both on an off the network, and see if the platform detects and prevents them
Check how much CPU and memory resources the platform consumers on the endpoint when idle
Change policies and see how long the changes take to propagate to endpoints.
Run a fileless attack such as Unicorn PowerShell to test both prevention and EDR abilities.
Run suspicious shell commands and note if your activity is detected, and how much information is provided in the alert.
See what it involves to deploy the platform on an endpoint and uninstall it.
Test remote control and visibility features – get information on processes, downloaded files, try killing a process and quarantining the endpoint, and see if after quarantine network access is really blocked.
Create a whitelist for files, websites or applications and check if they are really blocked
Endpoint Protection—Prevention, Detection and Protection with Cynet 360