Top 6 Endpoint Protection Platforms and How to Choose
Endpoint Protection Platforms (EPP) are essential to defend your organization’s workstations, mobile devices, servers and containers. Modern EPP solutions include advanced preventative measures, such as Next-Generation Antivirus which can block both known and unknown malware, and active defensive measures known as Endpoint Detection and Response (EDR).
In this page we’ll help you understand the criteria for selecting and evaluating EPPs, and review the top 5 EPP solutions, breaking down their capabilities into preventive and EDR features.
Scans email attachments, detects and blocks malicious payloads
Prevents unintentional user download of malicious files and drive-by downloads
Enables whitelisting and blacklisting of applications on the endpoint
Monitors behavior of the endpoint and uses machine learning techniques to identify suspicious activity
Endpoint Detection and Response (EDR)
Provides visibility into security incidents on the endpoint and gives security teams the tools to investigate and respond to them
Data Loss Prevention (DLP)
Prevents insider threats focused on data theft and exfiltration attempts by external attackers
Top 6 Endpoint Protection Platforms
1. Cynet 360
Operating system support: Windows, Mac, Linux
Prevention features: Next-Generation Antivirus (NGAV) that blocks malware, exploits, LOLBins, Macros, malicious scripts, and other malicious payloads. Zero-day protection using User and Entity Behavior Analytics (UEBA) to detect and block suspicious activity. Asset management, endpoint vulnerability assessments and application control, with auditing, logging and monitoring. Deception technology lures attackers to a honeypot, gathering useful intelligence about attack techniques. Network analytics identifies lateral movement, suspicious connections and logins.
EDR features: Advanced endpoint threat detection predicts attacker behavior based on continuous monitoring of endpoints and behavioral analysis. Searches and reviews historic or current incident data on endpoints to help investigate threats and validate alerts, for faster remediation. Automatic response orchestration and manual remediation of threats on endpoints. Deployment across thousands of endpoints within two hours.
Operating system support: Windows 7, 8, 10, Windows Server 2012, 2016, 2019, MacOS, Azure, Amazon Workspaces, VMware WS, ESX, ESXi, XenServer, Oracle VirtualBox
Prevention features: Antivirus, firewall and intrusion prevention, application and device control including file, registry and device access, application whitelisting and blacklisting, automated device erasure, enforcing policy on hosts, system lockdown.
EDR features: Offers Targeted Attack Analytics (TAA) with local and global telemetry, machine learning analysis of device behavior, threat intelligence. Assist with attack investigation, containment and resolution.
Prevention features: Mobile threat defense, security policy management, role-based access control (RBAC), adaptive anomaly control, encryption management, vulnerability and exploit prevention, security for web gateways and email servers, ransomware protection, application control, whitelisting and blacklisting, operating system and third-party software installation.
EDR features (EDR offered as separate product):
Library of automated responses to security incidents, such as wiping and reimaging endpoints.
Proactive Threat Hunting with fast search for threat data, Indicators of Compromise (IoC) search, proactive scanning of endpoints for anomalies
Central visibility and control of incident detection, forensics, prevention activity, and security alerts.
Operating system support: Windows XP, Vista, 7, 8, 10, Windows Server 2003, 2008, 2012, 2016, 2019, any virtualization platform running these operating systems.
Prevention features: Behavior classification for detecting zero-day threats, adaptive scanning for malware and other threats, next-gen anti-malware engine, safe browsing with web protection and filtering, prevents ransomware and grayware, integrated firewall blocks network attacks,
Threat Intelligence Exchange offers intelligence from multiple external and internal security sources
Dynamic Application Containment secures endpoints used as entry points for attacks
Repairs endpoint to last known good state
Actionable forensics helps identify infections and react quickly to contain them
EDR features: Tracks all activity on endpoints, contextualizes and identifies suspicious activity in real time, enables rapid response and rollback to last known good configuration, advanced threat hunting with full context of security incident forensics.
Don’t take vendor claims as a given. Take your EPP solution of choice for a spin before you by. Try some of these to test EPP capabilities for yourself:
Run known malware, both on an off the network, and see if the platform detects and prevents them
Check how much CPU and memory resources the platform consumers on the endpoint when idle
Change policies and see how long the changes take to propagate to endpoints.
Run a fileless attack such as Unicorn PowerShell to test both prevention and EDR abilities.
Run suspicious shell commands and note if your activity is detected, and how much information is provided in the alert.
See what it involves to deploy the platform on an endpoint and uninstall it.
Test remote control and visibility features – get information on processes, downloaded files, try killing a process and quarantining the endpoint, and see if after quarantine network access is really blocked.
Create a whitelist for files, websites or applications and check if they are really blocked
Endpoint Protection: Prevention, Detection and Protection with Cynet 360
Cynet 360 is a security solution that includes a complete EPP offering, including NGAV, device firewall, advanced EDR capabilities and automated incident response. Cynet 360 is a complete security solution that goes beyond endpoint protection, offering network analytics, UEBA and deception technology.
Cynet’s platform includes:
NGAV—blocks malware, exploits, LOLBins, Macros, malicious scripts, and other known and unknown malicious payloads.
Zero-day protection—uses User and Entity Behavior Analytics (UEBA) to detect suspicious activity and block unknown threats.
Monitoring and control—asset management, endpoint vulnerability assessments and application control, with auditing, logging and monitoring.
Response orchestration—automated playbooks and remote manual action for remediating endpoints, networks and user accounts affected by an attack.
Deception technology—lures attackers to a supposedly vulnerable honeypot, mitigating damage and gathering useful intelligence about attack techniques.
Network analytics—identifying lateral movement, suspicious connections and unusual logins.