The Ultimate Guide to Endpoint Detection and Response
2025 edition
Overview
Also known as EDR.
End points are the pointy end of the network and are often quite literally found in the user’s hands – as a laptop, smartphone, or other access device. Endpoints can also include IoT sensors or any other connected item, including printers and other peripherals. Endpoint Detection and Response is the cybersecurity technology responsible for monitoring, detecting, and addressing malware at device level.
Analyst reports

CONTEXT on EDR & SaaS
SaaS growth offsets IaaS slump in Western European clou...
Last week

Gartner on EDR & Malware
Why is ransomware still a thing in 2025?
This month

Gartner on EDR & Endpoint Protection
Bitdefender Launches PHASR to Fight Stealthy Cyber Thre...
Last month

AV-TEST on EDR & DevOps
Kaspersky tops 2024 security tests with record 97% TOP3...
Last month

Canalys on EDR & Data Protection
Acronis stops 7.5 million cyberattacks as platform grow...
Last month
Expert columns

By Dakshitaa Babu of SquareX
Why ClickFix attacks are outpacing enterprise security
Fri, 21st Mar 2025

By Edgar Zacharjev of Pulseway
From AI to automation: How Pulseway redefines IT remote...
Fri, 28th Feb 2025

By Steve Moros of Proofpoint
DeepSeek's rise: Navigating the AI data and security ch...
Tue, 11th Feb 2025

By Sadiq Iqbal of Check Point Software Technologies
From deepfakes to ransomware: The key trends which will...
Mon, 9th Dec 2024

By Gareth Cox of Exabeam
Stretching the SOC’s ability to cover more threats
Wed, 4th Dec 2024
More expert columns

By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Thu, 14th Nov 2024

By Steve Katanas of HID
Enhancing data centre security with mobile access contr...
Mon, 30th Sep 2024

By Steve Moros of Proofpoint
The insider threat: Why Australian businesses are most ...
Wed, 25th Sep 2024

By Innes Muir of Logpoint
How MDR will transform cybersecurity in the mid-market
Mon, 16th Sep 2024

By Devasmita Das of ColorTokens
Beyond prevention: Why breach readiness is your cyberse...
Mon, 19th Aug 2024

By Trevor Dearing of Illumio
Why the answer to AI threats is not more AI
Fri, 28th Jun 2024
Recent news

About Firewalls
Sophos partners with Capsule to streamline cyber insura...
Last week

About Software-as-a-Service
Acronis reaches 300 technology integrations in expandin...
Last week

About Productivity
Gordon Murray Group streamlines IT operations with Apog...
Last week

About Data Analytics
Tenable One platform adds connectors & custom risk dash...
Last week

About Software Updates
Cloudflare, Microsoft & police disrupt global malware s...
Last week
More news

About Ransomware
Ransomware attacks on industrial targets surge, AI tact...
Last week

About Gaming
AMD unveils new Radeon, Ryzen & AI PC innovations at Co...
Last week

About Cloud Services
Acronis partners with Adelaide Crows to boost cyber sec...
Last week

About Endpoint Protection
Kaspersky Endpoint Security achieves full marks in tamp...
This month

About Security intelligence
Tenable One unifies risk data with new connectors & das...
This month
Even more news

About Ransomware
Morphisec launches KICKSTART Channel Program to boost c...
This month

About Firewalls
Australia faces rising cyberattacks targeting key infra...
This month

About EduTech
HAT Distribution brings NinjaOne IT platform to ANZ par...
This month

About Endpoint Protection
AI arms race fuels surge in cybercrime & deepfake scams
This month

About iOS
BlackFog unveils AI update to detect dormant cyber atta...
This month
Job moves

Move at Saatchi & Saatchi
Whip Around appoints new directors as global expansion ...
Last week

Move at Pure Storage
Ekco appoints cloud industry veteran Ben Savage as CEO ...
This month

Move at Palo Alto Networks
WatchGuard CEO Prakash Panjwani steps down as Vats Sriv...
This month

Move at RMM
Andre Schindler promoted to SVP at NinjaOne amid growth
Fri, 6th Sep 2024

Move at Bitdefender
WithSecure appoints Samantha Cotton as UK & Ireland cha...
Fri, 16th Aug 2024
Other guides
You can read other related guides from Cybersecurity, Advanced Persistent Threat Protection, Artificial Intelligence, Extended Detection and Response, and Breach Prevention.
Powered by