Endpoint Detection and Response

The cyber security threat landscape becomes more sophisticated each day and regrettably, many businesses in New Zealand continue to expose themselves to unnecessary risk by relying solely on traditional solutions, such as anti-virus software, that are simply no longer fit for purpose.

Consequently, many companies are now opting to replace or enhance these solutions by implementing endpoint detection and response (EDR) solutions as an essential tool for safeguarding corporate networks against highly sophisticated attacks. EDR allows for a more proactive approach, enabling businesses to detect and respond to suspicious activity in real-time, before damage can be inflicted.

In a study by MITRE, EDR solutions detected and responded to 96% of the advanced threats tested, while anti-virus solutions detected and responded to only 31% of them.

What is EDR?

Our Endpoint Detection and Response (EDR) service is a fully managed monitoring service that provides 24/7 automated response, backed by our highly skilled Security Analysts, and built on Microsoft’s leading Defender for Endpoint security technology.

Our service provides advanced cyber security protection for endpoint devices – laptops, workstations, servers, and smartphones. EDR replaces traditional antivirus and provides much better protection against today’s sophisticated, persistent threats. EDR uses behavioural analysis, machine learning and other techniques that can recognise and stop what antivirus cannot. We use Microsoft Defender for Endpoint to provide the protection and alerting, and our Security Operations Teams to monitor, analyse and respond to the alerts.

Benefits

  • Advanced protection Brings together the advanced protection of Microsoft’s Defender for Endpoint with the expertise and experience of our Security Operations Team.
  • Complete visibility – through cComprehensive log collection from endpoints, such as system logs, network traffic, and file activity.
  • Automated responses to block malware, suspicious processes and malicious network connections.
  • Advanced analytics and machine learning algorithms to identify suspicious behavior, indicators of compromise (IOCs), and potential security incidents.
  • Real-time alerts to our Security Operations Team, enabling us to investigate and respond to any incident promptly.
  • Human expertise to identify false positives, tune detection rules and analyse true positives.

Key Features of EDR:

  • Monitoring Continuously monitoring and collecting data from endpoints, such as system logs, network traffic, and file activity.
  • Advanced analytics and machine learning algorithms to identify suspicious behavior, indicators of compromise (IOCs), and potential security incidents.
  • Real Time Alerting – When a threat or suspicious activity is detected, EDR systems provide real-time alerts to our Security Operations Team, enabling them to investigate and respond to the incident promptly.
  • 24/7 monitoring and investigation by our Security Operations Team.
  • Custom detection rules our Security Operations Team are continually tuning and optimising the detection rules, and creating custom rules based on our threat feeds, local market knowledge, and visibility across our entire customer base.

What’s the difference between EDR and traditional AV?

EDRTraditional AV
Threat DetectionEnhanced detection of advanced threats, including zero-day exploits, fileless and codeless attacks, and sophisticated malware.Detects malicious code and must know something is bad to stop it.
Incident ResponseReal-time visibility into endpoint activities, allowing security teams toinvestigate and respond to incidents more effectively.Minimal insight and does not support IR.
Behavioral AnalysisMonitors and analyses endpoint behavior, looking for deviations from normal patterns.Relies on file and code signatures.
Flexibility and CustomizationGranular control and customisation options. Security teams can definespecific rules, indicators of compromise (IOCs), and detection mechanisms.Has simple and pre-defined detection rules based on signatures.

It’s time your IT delivered results

Have an IT specialist call you to discuss your technology needs.