Getting the Most out of Endpoint Security Solution Evaluations

The endpoint security market has evolved over the last decade from a “one agent to rule them all” approach, to “best of breed,” to today’s “Platformula” model. The evolution of endpoint security companies has driven innovation in machine learning (ML), user and entity behavior analytics (UEBA), root-cause analysis (RCA), and managed detection and response (MDR). Numbering at times in the dozens, this highly commoditized space is a constant target for merger and acquisition, expansion of legacy antivirus suites and VC-backed startup companies to take a piece of the near-$20 billion market opportunity.
With so much attention from endpoint security manufacturers — and the frequency of change — it can be difficult for organizations to choose the best product to fit their business requirements. While most organizations build out a requirement matrix for a proof of concept, it’s not always feasible to evaluate those requirements against every player in the space.
Randy Wakins, CTO of CRITICALSTART and Forbes Technical Council member, shares his thoughts on how to get the most out of your endpoint security solution evaluations and the importance of understanding what goes into vendor comparison before making a technology investment.
Featured in Forbes | December 12, 2019
Stay Connected on Today’s Cyber Threat Landscape
RELATED RESOURCES
Data Sheet
Third-Annual CRITICALSTART Research Report reveals persistent challenges and some silver linings
It’s back! For the third year in a row, we have surveyed SOC professionals from across the industr...- News
CRITICALSTART aims to eliminate “acceptable risk” from cybersecurity’s vocabulary
CRITICALSTART, a leading and trusted provider of Managed Detection and Response (MDR) services to hu... - News
SMU Cox Dallas 100™ Names CRITICALSTART One of the Fastest Growing Privately Held Companies in Dallas Area
PLANO, TX, (February, 25 2020) – CRITICALSTART, a leading cybersecurity provider of Managed ...
RESOURCE CATEGORIES
-
- Consumer Education(39)
- Consumer Stories(2)
- Cybersecurity Consulting(10)
- Data Breaches(15)
- Data Privacy(43)
- Incident Response(9)
- Interview(51)
- MDR Services(64)
- MOBILESOC(9)
- News(4)
- Penetration Testing(16)
- Press Release(59)
- Research Report(9)
- Security Assessments(16)
- TEAMARES(17)
- Thought Leadership(17)
- Threat Hunting(9)
- Video(1)
- Vulnerability Disclosure(3)