The Ultimate Guide to Endpoint Detection and Response
2025 edition
Overview
Also known as EDR.
End points are the pointy end of the network and are often quite literally found in the user’s hands – as a laptop, smartphone, or other access device. Endpoints can also include IoT sensors or any other connected item, including printers and other peripherals. Endpoint Detection and Response is the cybersecurity technology responsible for monitoring, detecting, and addressing malware at device level.
Analyst reports

Canalys on EDR & SaaS
MSP report forecasts growth in revenue & cybersecurity
This month

Gartner on EDR & Phishing
Exclusive: SquareX aims to redefine cybersecurity with ...
Last month

IDC on EDR & Digital Transformation
Zscaler launches asset exposure tool to tackle cyber ri...
Last month

CONTEXT on EDR & SaaS
European cybersecurity market sees 2% growth in 2024
Tue, 21st Jan 2025

Gartner on EDR & Endpoint Protection
SentinelOne honoured as 2024 Gartner Customers' Choice
Tue, 7th Jan 2025
Expert columns

By Dakshitaa Babu of SquareX
Why ClickFix attacks are outpacing enterprise security
Last week

By Edgar Zacharjev of Pulseway
From AI to automation: How Pulseway redefines IT remote...
Last month

By Steve Moros of Proofpoint
DeepSeek's rise: Navigating the AI data and security ch...
Last month

By Sadiq Iqbal of Check Point Software Technologies
From deepfakes to ransomware: The key trends which will...
Mon, 9th Dec 2024

By Gareth Cox of Exabeam
Stretching the SOC’s ability to cover more threats
Wed, 4th Dec 2024
More expert columns

By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Thu, 14th Nov 2024

By Steve Katanas of HID
Enhancing data centre security with mobile access contr...
Mon, 30th Sep 2024

By Steve Moros of Proofpoint
The insider threat: Why Australian businesses are most ...
Wed, 25th Sep 2024

By Innes Muir of Logpoint
How MDR will transform cybersecurity in the mid-market
Mon, 16th Sep 2024

By Devasmita Das of ColorTokens
Beyond prevention: Why breach readiness is your cyberse...
Mon, 19th Aug 2024

By Trevor Dearing of Illumio
Why the answer to AI threats is not more AI
Fri, 28th Jun 2024
Top players
Recent news

About Firewalls
CrowdStrike boosts Falcon with new AI risk management t...
2 days ago

About Business Continuity
NTT DATA & Rubrik enhance global ransomware protection
3 days ago

About Endpoint Protection
Kaspersky acclaimed for OT cybersecurity innovation in ...
Last week

About Malware
Vivek Ramachandran to discuss cyber threats in Singapor...
Last week

About Ransomware
February 2025 reports record spike in ransomware attack...
This month
More news

About Collaboration
Siemens expands PAVE360 with AMD & Microsoft collaborat...
This month

About Firewalls
CYFOX unveils OmniSec GenAI to ease security workloads
This month

About SpaceTech
Red Hat partners with Axiom Space for station data cent...
This month

About Endpoint Protection
Bitdefender joins AWS programme to boost global presenc...
This month

About Cloud Services
Jamf to acquire Identity Automation for $215 million
This month
Even more news

About Endpoint Protection
Trojan banker attacks on Android rise 196% in 2024
This month

About Software-as-a-Service
Intel expands AI PC portfolio with Core Ultra launch
This month

About Cloud Services
Kaspersky uncovers malware attack in Asia-Pacific regio...
Last month

About Cloud Services
Data leak at Chinese firm reveals government monitoring
Last month

About Endpoint Protection
OpenText unveils new AI tool to counter insider threats
Last month
Job moves

Move at RMM
Andre Schindler promoted to SVP at NinjaOne amid growth
Fri, 6th Sep 2024

Move at Bitdefender
WithSecure appoints Samantha Cotton as UK & Ireland cha...
Fri, 16th Aug 2024

Move at IBM
Acronis appoints Andrea Martin to boost NZ & Pacific pr...
Mon, 12th Aug 2024

Move at Tanium
Tanium appoints Rani Johnson, Tim Millikin to board of ...
Fri, 31st May 2024

Move at Rackspace
Paul Tuffs named as Tanium's VP for A/NZ in expansion b...
Tue, 14th May 2024
Other guides
You can read other related guides from Cybersecurity, Advanced Persistent Threat Protection, Extended Detection and Response, Malware, and Breach Prevention.
Powered by