The Ultimate Guide to Endpoint Detection and Response
2025 edition
Overview
Also known as EDR.
End points are the pointy end of the network and are often quite literally found in the user’s hands – as a laptop, smartphone, or other access device. Endpoints can also include IoT sensors or any other connected item, including printers and other peripherals. Endpoint Detection and Response is the cybersecurity technology responsible for monitoring, detecting, and addressing malware at device level.
Analyst reports

Gartner on EDR & Endpoint Protection
Bitdefender Launches PHASR to Fight Stealthy Cyber Thre...
Last month

AV-TEST on EDR & DevOps
Kaspersky tops 2024 security tests with record 97% TOP3...
Last month

Canalys on EDR & Data Protection
Acronis stops 7.5 million cyberattacks as platform grow...
Last month

CONTEXT on EDR & Firewalls
European cybersecurity market sees 18% growth in sales
Last month

AV-TEST on EDR & Malware
Kaspersky wins nine AV-TEST awards for cybersecurity ex...
Last month
Expert columns

By Dakshitaa Babu of SquareX
Why ClickFix attacks are outpacing enterprise security
Fri, 21st Mar 2025

By Edgar Zacharjev of Pulseway
From AI to automation: How Pulseway redefines IT remote...
Fri, 28th Feb 2025

By Steve Moros of Proofpoint
DeepSeek's rise: Navigating the AI data and security ch...
Tue, 11th Feb 2025

By Sadiq Iqbal of Check Point Software Technologies
From deepfakes to ransomware: The key trends which will...
Mon, 9th Dec 2024

By Gareth Cox of Exabeam
Stretching the SOC’s ability to cover more threats
Wed, 4th Dec 2024
More expert columns

By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Thu, 14th Nov 2024

By Steve Katanas of HID
Enhancing data centre security with mobile access contr...
Mon, 30th Sep 2024

By Steve Moros of Proofpoint
The insider threat: Why Australian businesses are most ...
Wed, 25th Sep 2024

By Innes Muir of Logpoint
How MDR will transform cybersecurity in the mid-market
Mon, 16th Sep 2024

By Devasmita Das of ColorTokens
Beyond prevention: Why breach readiness is your cyberse...
Mon, 19th Aug 2024

By Trevor Dearing of Illumio
Why the answer to AI threats is not more AI
Fri, 28th Jun 2024
Recent news

About iOS
BlackFog unveils AI update to detect dormant cyber atta...
Today

About Security Information and Event Management
Tuskira launches AI Analyst Workforce to automate threa...
Last week

About Endpoint Protection
Arctic Wolf doubles warranty to USD $3 million with new...
Last week

About Endpoint Protection
CrowdStrike unveils Charlotte AI upgrade to boost secur...
Last week

About Security Information and Event Management
AppOmni launches protocol server to boost security team...
Last week
More news

About EduTech
Scalefusion launches in UK & Ireland to bolster cyberse...
Last week

About Machine learning
AI & machine learning power new cyber threat defence to...
Last week

About Firewalls
Amplifier Security secures USD $5.6 million for AI plat...
Last month

About Small Business
Chinese APT group linked to cyber attack on US defence ...
Last month

About Threat intelligence
Mandiant report finds rise in financially motivated cyb...
Last month
Even more news

About Endpoint Protection
Kaspersky named leader in 2025 SPARK Matrix for cyber t...
Last month

About Malware
OPSWAT partners with Sektor Cyber to boost ANZ presence
Last month

About Productivity
Lenovo unveils IdeaPad Slim 3 2025 in India from INR ₹6...
Last month

About Firewalls
SureStack unveils AI platform for real-time cyber defen...
Last month

About Endpoint Protection
Logicalis launches Cisco XDR managed service in Asia Pa...
Last month
Job moves

Move at RMM
Andre Schindler promoted to SVP at NinjaOne amid growth
Fri, 6th Sep 2024

Move at Bitdefender
WithSecure appoints Samantha Cotton as UK & Ireland cha...
Fri, 16th Aug 2024

Move at IBM
Acronis appoints Andrea Martin to boost NZ & Pacific pr...
Mon, 12th Aug 2024

Move at Tanium
Tanium appoints Rani Johnson, Tim Millikin to board of ...
Fri, 31st May 2024

Move at Tanium
Paul Tuffs named as Tanium's VP for A/NZ in expansion b...
Tue, 14th May 2024
Other guides
You can read other related guides from Cybersecurity, Advanced Persistent Threat Protection, Artificial Intelligence, Extended Detection and Response, and Breach Prevention.
Powered by