1. Knowledge Base
  2. Cybersecurity
  3. Cybersecurity and Business Continuity Monthly Open Call

Endpoint Protection and Software

What has your firm implemented for endpoint protection, using what tools/software?

Endpoint Protection and Software:

A notable 81% of US government agencies say that ZTA (Zero Trust Authentication) is highly or extremely difficult to implement, compared to 59% of those from critical infrastructure organizations.

Overall, however, EDR (Endpoint Detection Response) and XDR (Extended Detection Response) are the most likely to be difficult to implement (66%) among all US respondents, while MFA (multifactor authentication) is the least likely. - Published by Trellix Cyber Readiness Research. Click here to view the full report.

Member Firm Responses:

  • Taegis XDR, and states they are “Very impressed and I like how you can scale just how much or how little you want them to do and the SOC support on ANY alert is really useful.”
  • Trend Micro™ Managed XDR ; it has been a very “successful implementation.”
  • Cososys Endpoint Protector for DLP and McAfee Endpoint Security as antivirus.
    "We are overall pleased with these solutions, as we are covering the security and the GDPR compliance requirements."