Protect your Customers with MSP360 Managed Backup
Join David Gugick for an overview and demo of MSP360’s powerful and profitable backup services. Continue reading
Join David Gugick for an overview and demo of MSP360’s powerful and profitable backup services. Continue reading
As cyberattacks continue to grow in complexity and frequency, MSPs must grow their toolsets for managing security. Traditional tools like antivirus platforms and malware scanners remain important. But to identify and remediate fast-moving threats in modern environments, endpoint detection and response (EDR) platforms are critical, too. Indeed, in some cases you may wish to use EDR tools in place of antivirus software.
Keep reading for an overview of EDR, including how it works, how it’s different from antivirus and why MSPs should include EDR within their security toolsets.
Endpoint detection and response, or EDR, is a category of security tools that detect and manage security threats by analyzing data collected from network endpoints. In other words, by monitoring network endpoints - meaning devices and other resources that are connected to a local network - EDR tools identify anomalies, insecure configurations and other issues associated with security problems.
EDR tools’ focus on endpoints makes them different from tools that simply control network traffic (like firewalls) or scan data for malware (like antivirus tools).
By taking a different approach to security, EDR provides MSPs with benefits that they can’t leverage from other tools:
All of these advantages are especially important given the complexity of modern cyberattacks, which increasingly rely on automation to deploy more complex attacks, as well as make attacks harder to detect. EDR provides MSPs with another tool in their battle against ever-intensifying cybersecurity threats.
Assess vulnerabilities and threats, network security, workspace and equipment security, documentation, and more. The pack includes:
EDR platforms vary somewhat in functionality, but all provide a core set of essential endpoint security monitoring and management features:
Further reading Responding to Cyberattacks: 6 Top Tips
In some ways, EDR tools resemble antivirus tools, in that both types of solutions help to find and address threats. However, they are fundamentally different types of platforms, for several reasons.
One is the type of threats they can handle. Antivirus tools focus on detecting malware. EDR platforms can detect a wide variety of attacks, from malware exploits to traffic patterns that indicate a DDoS attack, to privilege escalation on endpoints.
Antivirus platforms also rely on less sophisticated means of detecting threats. They rely primarily on databases of known malware types, and scan environments for data that matches known malware. In contrast, EDR tools use advanced analytics techniques to interpret a wide set of data - such as endpoint operating system and application software versions, network traffic patterns and access control files - to detect threats.
Finally, antivirus tools are reactive. They identify threats after those threats are established. In contrast, EDR platforms can identify threats as they emerge. They can find an insecure endpoint as soon as it joins the network, for example, and block it before an exploit actually takes place.
Overall, then, EDR platforms are more advanced and sophisticated. When possible, choose EDR over antivirus tools. However, it's important to ensure you have the staff required to manage EDR tools, which are more complicated to deploy than simple antivirus solutions. You should also think about the size and configuration of the networks you have to manage. Smaller, simpler networks may be effectively managed with antivirus, whereas EDR's flexibility makes it a good choice for larger networks, or those that you expect to scale quickly.
A variety of commercial EDR tools exist. Popular options include:
If you offer managed security services and need to detect complex, fast-moving threats, EDR tools provide the flexibility and sophisticated analytics techniques necessary to help you do so. Although antivirus alone may be enough for managing the security of small networks, EDR is an increasingly critical part of MSP security toolsets.
Tracking and managing all of the devices connected to a modern network is hard enough. What's even harder, however, is keeping those devices secure. Each device is a potential gateway that attackers could exploit to gain unauthorized access to the network. What's more, attacks can easily expand from one device to others if devices are not properly secured. Continue reading
We are excited to announce that the latest edition of MSP360 Free Backup now allows users to protect up to 5 TB of data when using Amazon S3! Continue reading
Last December, customers and friends of MSP360 were given the chance to participate in a giveaway full of sweet goodies. Gold, silver, and bronze tickets were hidden underneath the ordinary wrappers of MSP360 chocolate bars. Each ticket revealed a special prize! Continue reading
To be successful, MSPs need to make sure they are using the right products, in the right place, at the right time. Creating a successful backup services offering can be a daunting task, but this webinar will aim to simplify the things MSPs can do to minimize the stress while maximizing sales and customer retention. Continue reading
Every intelligent MSP technician has an understanding of the three-letter acronyms that enable networks to function and allow traffic to flow. Network address translation, commonly referred to as “NAT”, is one of them. Without network address translation, traffic would never be able to make it past the routing device. Here is a quick breakdown of what NAT is and why we need it, and an overview of NAT tools and the security issues that go along with it. Continue reading
Download our guide to learn about zero trust security model, and find out how to employ this concept to protect your network. Continue reading
For you as a managed IT business owner, the tech team is both your main asset and your main cost driver. It's they who solve most of the daily issues and outline and manage new projects. Hence, if one of your technicians decides to leave, it will take you months to hire, if not a better, at least as good a specialist. And let's not forget that any new team member should be properly onboarded. Continue reading
IT project management has grown into a buzzword nowadays. However, you don't need sophisticated project management during routine operations, since it will make things unnecessarily complex. Nevertheless, there are certain cases when even small teams win from implementing the right IT project management frameworks. Continue reading
Download this guide to learn the best practices to follow with regard to compliance standards and disposing of hardware in general, and how to provide your customers with IT asset disposal services. Continue reading
A couple of years ago, “agile” was among the top buzzwords in IT. It was so popular, in fact, that it became a synonym for the words ”operational efficiency” and even ”success”. However, not every process can be ”agiled”. In this article, we will define the basics of the agile approach but, more importantly, we will define the areas in which you can actually benefit from being an agile MSP. Continue reading