{"id":3485,"date":"2021-12-16T11:41:21","date_gmt":"2021-12-16T11:41:21","guid":{"rendered":"https:\/\/cms.idc-custom.solutions\/?post_type=idcproduct&p=3485"},"modified":"2022-12-06T11:00:13","modified_gmt":"2022-12-06T11:00:13","slug":"eset-worldwide-modern-endpoint-security-for-enterprises-2021-vendor-assessment","status":"publish","type":"idcproduct","link":"https:\/\/cms.idc-custom.com\/idcproduct\/eset-worldwide-modern-endpoint-security-for-enterprises-2021-vendor-assessment\/","title":{"rendered":"ESET – Worldwide Modern Endpoint Security for Enterprises 2021 Vendor Assessment"},"content":{"rendered":"\r\n<\/a>\n\n\r\n
\r\n\t
\r\n\t\t\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\"\"<\/picture>\t\t
<\/div>\r\n\t\t\r\n\t\t\t
\r\n\t\t\t\t
\r\n\t\t\t\t\t<\/svg>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t
\r\n\t\t\t\t\tWatch Video\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t
\r\n\t\t\t

Michael Suby<\/h2>\r\n\t\t\t
\r\n\t\t\t\t

Research Vice President, Security & Trust<\/p>\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n\n\n\r\n<\/a>\n\n\n

\r\n\t

\r\n\t\tWorldwide Modern Endpoint Security for Enterprises, 2021\t<\/h3>\r\n\r\n
\r\n\t
\r\n\t\t\r\n\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/g>\r\n\r\n\t\t\t\r\n\t\t\t\tCapabilities<\/text>\r\n\t\t\t\tStrategies<\/text>\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\tParticipants<\/span>\r\n\t\t\t\t<\/foreignObject>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\tContenders<\/span>\r\n\t\t\t\t<\/foreignObject>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\tMajor Players<\/span>\r\n\t\t\t\t<\/foreignObject>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\tLeaders<\/span>\r\n\t\t\t\t<\/foreignObject>\r\n\t\t\t<\/g>\r\n\r\n\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/g>\r\n\r\n\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t<\/g>\r\n\r\n\t\t\t\t\t\t\r\n\t\t<\/svg>\r\n\r\n\t\t
\r\n\t\t\t
\r\n\t\t\t\t

<\/p>\r\n\t\t\t\t

<\/p>\r\n\t\t\t\t

<\/p>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t

\r\n\t\t

Contenders<\/p>\r\n\t\t\t\t\t

\r\n\t\t\t\t\t\t
<\/div>\r\n\t\t\t\t\t\t

\r\n\t\t\t\t\t\t\tBlackBerry\t\t\t\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t

\r\n\t\t\t\t\t\t
<\/div>\r\n\t\t\t\t\t\t

\r\n\t\t\t\t\t\t\tDeep Instinct\t\t\t\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t<\/div>

Major Players<\/p>\r\n\t\t\t\t\t

\r\n\t\t\t\t\t\t
<\/div>\r\n\t\t\t\t\t\t

\r\n\t\t\t\t\t\t\tCisco\t\t\t\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t

\r\n\t\t\t\t\t\t
<\/div>\r\n\t\t\t\t\t\t

\r\n\t\t\t\t\t\t\tCybereason\t\t\t\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t

\r\n\t\t\t\t\t\t
<\/div>\r\n\t\t\t\t\t\t

\r\n\t\t\t\t\t\t\tESETFeatured Vendor<\/em>\t\t\t\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t

\r\n\t\t\t\t\t\t
<\/div>\r\n\t\t\t\t\t\t

\r\n\t\t\t\t\t\t\tFireEye\t\t\t\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t

\r\n\t\t\t\t\t\t
<\/div>\r\n\t\t\t\t\t\t

\r\n\t\t\t\t\t\t\tFortinet\t\t\t\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t

\r\n\t\t\t\t\t\t
<\/div>\r\n\t\t\t\t\t\t

\r\n\t\t\t\t\t\t\tKaspersky\t\t\t\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t

\r\n\t\t\t\t\t\t
<\/div>\r\n\t\t\t\t\t\t

\r\n\t\t\t\t\t\t\tMcAfee Enterprise\t\t\t\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t

\r\n\t\t\t\t\t\t
<\/div>\r\n\t\t\t\t\t\t

\r\n\t\t\t\t\t\t\tSentinelOne\t\t\t\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t

\r\n\t\t\t\t\t\t
<\/div>\r\n\t\t\t\t\t\t

\r\n\t\t\t\t\t\t\tTrend Micro\t\t\t\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t

\r\n\t\t\t\t\t\t
<\/div>\r\n\t\t\t\t\t\t

\r\n\t\t\t\t\t\t\tVMware\t\t\t\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t

\r\n\t\t\t\t\t\t
<\/div>\r\n\t\t\t\t\t\t

\r\n\t\t\t\t\t\t\tWatchGuard\t\t\t\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t

\r\n\t\t\t\t\t\t
<\/div>\r\n\t\t\t\t\t\t

\r\n\t\t\t\t\t\t\tBroadcom\t\t\t\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t

\r\n\t\t\t\t\t\t
<\/div>\r\n\t\t\t\t\t\t

\r\n\t\t\t\t\t\t\tPalo Alto Networks\t\t\t\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t

\r\n\t\t\t\t\t\t
<\/div>\r\n\t\t\t\t\t\t

\r\n\t\t\t\t\t\t\tCheck Point\t\t\t\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t

\r\n\t\t\t\t\t\t
<\/div>\r\n\t\t\t\t\t\t

\r\n\t\t\t\t\t\t\tSophos\t\t\t\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t<\/div>

Leaders<\/p>\r\n\t\t\t\t\t

\r\n\t\t\t\t\t\t
<\/div>\r\n\t\t\t\t\t\t

\r\n\t\t\t\t\t\t\tCrowdStrike\t\t\t\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t

\r\n\t\t\t\t\t\t
<\/div>\r\n\t\t\t\t\t\t

\r\n\t\t\t\t\t\t\tMicrosoft\t\t\t\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t<\/div>\t<\/div>\r\n<\/div>\n\n\n

<\/p>\n\n\n\n

IDC MarketScape Methodology<\/a><\/p>\n<\/div><\/div>\n\n\n\r\n<\/a>\n\n\n

\n

IDC Opinion<\/h2>\n\n\n\n

The criticality of effective endpoint security has never been greater for enterprises. A principal reason is enterprises’ evolving IT footprint. Spurred by the COVID-19 pandemic, millions of office workers changed locations from onsite to work from home (WFH). While workers are gradually returning to the office, the workplace landscape for many organizations is unlikely to return to its pre-pandemic state. In addition, the usage of cloud applications surged during the pandemic as business leaders sought flexibility to support their immediate needs and to better compete in a digitally transformed future. <\/p>\n\n\n\n

This dual shift of workers and applications to off premises has been a gift to threat actors. The exploitability of personal computers (PCs) of WFH employees increased. In addition to being situated outside office-based perimeter defenses, these devices were now on a full-time basis connecting through unmanaged home networks and with increasing potential, used for nonbusiness purposes and by other family members. The viability for threat actors to infect remote PCs, in essence, multiplied. And since users of these devices required access to cloud-based applications (custom and software as a service) and on-premises applications through a VPN to remain productive, the attractiveness of PCs as targets rose. Moreover, as worker remoteness increased along with access to both cloud and on-premises applications, business networks became flatter. Legacy approaches to use network segmentation as a security mechanism became less effective. Also a benefit to threat actors, their lateral movement from the first infected PCs to other PCs and connected IT systems encountered fewer barriers. <\/p>\n\n\n\n

Not only have threat actors intensified their focus on endpoints, but they have also advanced their tradecraft. A decade ago, signature-based antivirus software was considered an adequate defense in identifying and removing malware from end-users’ devices. Times have radically changed. Threat actors no longer rely exclusively on dropping malware onto devices to carry out their attacks. Instead, they are more apt to manipulate legitimate software programs, tools, and files (i.e., living off the land attacks). Subsequently, identifying behaviors of malicious intent has become a requirement in mounting an adequate defense.<\/p>\n\n\n\n

Identifying malicious behaviors, however, is no simple task. The varied, wide ranging, and complex nature of what end-user devices (PCs and smartphones) are equipped to do blurs the distinction between malicious and legitimate behaviors. In addition, threat actors will orchestrate a series of actions, each seemingly benign, to further disguise their presence. Assembling the trail of related actions has become essential in uncovering active attacks and then responding with speed and precision to blunt them.<\/p>\n\n\n\n

Building up endpoint security is crucial. Modern endpoint security (MES) products, the combination of endpoint protection platforms (EPPs) for deterministic prevention and endpoint detection and response (EDR) for post-compromise reaction, are the latest evolution in endpoint security designed to combat threats aimed at endpoints. It is confirmed through IDC research that the demand for modern endpoint security is on the rise. <\/p>\n\n\n\n

A modern endpoint security product, however, is not an island. Rather, it is a component in a constellation of complementary security technologies and operations that function together to fortify the security posture of endpoints and the resiliency of business functions. Given this more holistic view of modern endpoint security, enterprises should not limit their assessment of the independent merits of modern endpoint security products. They should also examine integration and workflow streamlining with and across other technologies that fortify security and enhance security and IT operations. A list of these technologies includes but are not limited to hardware-based device integrity checks and restoration, endpoint\/IT hygiene management, file and data backup and recovery, and the evolution of EDR to eXtended Detection and Response (XDR). <\/p>\n<\/div><\/div>\n\n\n\n