Endpoint security vendors must be a one-stop endpoint security shop -- providing such things as anti-malware, anti-exploit, EDR and hybrid deployment options -- if they want to compete. Credit: Thinkstock The movement toward next-generation endpoint security has accelerated over the last few years for a simple reason: Cybersecurity professionals aren’t happy with the efficacy of existing antivirus tools.This market demand has led to a wave of investment and innovation from vendors such as Carbon Black, CrowdStrike, Cybereason, Cylance, Morphisec, and SentinelOne.New endpoint security technologies tended to come in one of two areas. Advanced prevention tools added new techniques for detecting malware that bypassed AV signatures. Many of these tools also contained anti-exploit technologies for detecting and blocking common memory exploits and/or attacks against common applications like browsers.At the other end of the endpoint security continuum, some organizations had new requirements for endpoint detection and response (EDR). These tools monitor endpoint behavior and collect data, which is then used for security analytics. In the past, most organizations chose new tools for advanced prevention or EDR but not both. About 75 to 80 percent went with advanced prevention, and the remainder chose EDR. This purchasing and deployment behavior is changing, however. According to ESG research, 87 percent of organizations have purchased or are planning to purchase a comprehensive endpoint security suite that contains both advanced prevention and EDR. (Note: I am an ESG employee.) Thus, endpoint security vendors must be a one-stop endpoint security shop if they want to compete for business. 7 must-have endpoint security functionsOK, so organizations want a comprehensive suite of endpoint security functionality, but what the heck does that mean? Based upon lots of research, “must-have” endpoint security functionality includes:High-efficacy malware detection/blocking. This can be based upon layered endpoint security technologies (i.e. AV signatures, heuristics, IoC comparisons, etc.) or solely on machine learning algorithms — as long as it detects and blocks 90 percent-plus pedestrian and zero-day file and fileless malware while maintaining a low false positive rate. Anti-exploit technologies. As previously described, this technology blocks in memory and common application-layer attacks. Blocking ransomware comes to mind here. Note that anti-exploit technologies can be fairly geeky, so CISOs should look for options that are easy to configure and operate. EDR capabilities. CISOs should choose carefully here, as there is a lot of product variation in EDR tools. Large organizations with advanced security analytics and SOC skills may want to collect, process, analyze, and retain all endpoint security data, while less experienced organizations may only want EDR capabilities based upon other security alert “triggers.” EDR may also be an area where managed services are especially attractive for overwhelmed or under-staffed security departments. EDR is a requirement for endpoint security suites, but organizations should approach EDR with eyes wide open — caveat emptor. A single endpoint agent. Leading products should be based upon a single, easy-to-deploy and operate agent. Some vendors may use several agents today with roadmap plans to consolidate to a single agent. Again, caveat emptor. Centralized management. All functionality should report into a centralized management system. For separation of duties, centralized management should support multi-factor authentication, customized views/dashboards, and role-based access control. Hybrid deployment options. Organizations should be able to pick and choose whether the endpoint security management plane lives on premises, in the cloud, or is made up of a combination of both. Remediation capabilities. When an endpoint gets infected, security and IT operations need the ability to quarantine the system, delete registry keys, or terminate malicious processes. Endpoint security tools should make this an easy administrative task. Yes, some systems will still need to be reimaged, but endpoint security tools should provide ample remediation options that help greatly reduce the number of system reimages necessary. A few other points:I’d classify everything else (i.e. asset management capabilities, application white listing, port controls, etc.) as “nice to have” functionality. These capabilities may be very important to some users and unimportant to others, so if you need them, seek out vendors that offer them.Asset management, vulnerability management, and patch management did not make my list of “gotta have” functionality, but these capabilities are moving to endpoint security. Pay attention to this area. Yes, you need DLP and other types of file-level data security on endpoints. DLP doesn’t need to be part of an endpoint security suite, but some organizations may find a single endpoint security/DLP solution attractive. Traditional endpoint security controls, such as full-disk encryption and firewalls, have really migrated to the operating systems. As such, they don’t really need to be part of new endpoint security suites. Vendors may supplement endpoint security products with managed services. Some CISOs will find it attractive to own some endpoint security functionality themselves and to outsource others.Some vendors participate in third-party testing, while others eschew these tests, claiming they no longer apply to new types of endpoint security technology. While third-party tests can provide objective metrics, I strongly suggest organizations conduct their own detailed and diligent product testing. In other words, don’t rely on third parties or let vendors take the lead on product testing. You’re on your own to make the best decision here. Finally, endpoint security can be confusing. Organizations should approach any new endpoint security decisions with thorough research on the market, technologies, and vendors. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe