Getting the Most out of Endpoint Security Solution Evaluations

The endpoint security market has evolved over the last decade from a “one agent to rule them all” approach, to “best of breed,” to today’s “Platformula” model. The evolution of endpoint security companies has driven innovation in machine learning (ML), user and entity behavior analytics (UEBA), root-cause analysis (RCA), and managed detection and response (MDR). Numbering at times in the dozens, this highly commoditized space is a constant target for merger and acquisition, expansion of legacy antivirus suites and VC-backed startup companies to take a piece of the near-$20 billion market opportunity.

With so much attention from endpoint security manufacturers — and the frequency of change — it can be difficult for organizations to choose the best product to fit their business requirements. While most organizations build out a requirement matrix for a proof of concept, it’s not always feasible to evaluate those requirements against every player in the space.

Randy Wakins, CTO of CRITICALSTART and Forbes Technical Council member, shares his thoughts on how to get the most out of your endpoint security solution evaluations and the importance of understanding what goes into vendor comparison before making a technology investment.


Featured in Forbes | December 12, 2019

Newsletter Signup

Stay up-to-date on the latest resources and news from CRITICALSTART.
Benchmark your cybersecurity against peers with our Free Quick Start Risk Assessments tool!
This is default text for notification bar