Getting the Most out of Endpoint Security Solution Evaluations

The endpoint security market has evolved over the last decade from a “one agent to rule them all” approach, to “best of breed,” to today’s “Platformula” model. The evolution of endpoint security companies has driven innovation in machine learning (ML), user and entity behavior analytics (UEBA), root-cause analysis (RCA), and managed detection and response (MDR). Numbering at times in the dozens, this highly commoditized space is a constant target for merger and acquisition, expansion of legacy antivirus suites and VC-backed startup companies to take a piece of the near-$20 billion market opportunity.
With so much attention from endpoint security manufacturers — and the frequency of change — it can be difficult for organizations to choose the best product to fit their business requirements. While most organizations build out a requirement matrix for a proof of concept, it’s not always feasible to evaluate those requirements against every player in the space.
Randy Wakins, CTO of CRITICALSTART and Forbes Technical Council member, shares his thoughts on how to get the most out of your endpoint security solution evaluations and the importance of understanding what goes into vendor comparison before making a technology investment.
Featured in Forbes | December 12, 2019
Stay Connected on Today’s Cyber Threat Landscape
Thanks for signing up!
RELATED RESOURCES
Datasheet
Security Operations Center (SOC)
Our SOC is ready to extend the detection and response capabilities of your cybersecurity operations ...Quick Card
MDR for Microsoft Sentinel
Our Managed Detection and Response (MDR) Services for Microsoft Sentinel™ simplifies breach preven...Quick Card
MDR for Splunk Cloud
Our Managed Detection and Response (MDR) Services for Splunk® Cloud simplifies breach prevention an...
RESOURCE CATEGORIES
-
- Consumer Education(40)
- Consumer Stories(2)
- Cybersecurity Consulting(7)
- Data Breaches(15)
- Data Privacy(43)
- Incident Response(2)
- Interview(51)
- MDR Services(69)
- MOBILESOC(9)
- News(5)
- Penetration Testing(5)
- Press Release(65)
- Research Report(10)
- Security Assessments(4)
- TEAMARES(6)
- Thought Leadership(18)
- Threat Hunting(3)
- Video(1)
- Vulnerability Disclosure(1)