PROTECTION MATTERS

Choosing Endpoint Protection: What to Consider?

09 Aug 2021

    Endpoint protection is one of the most important parts of a multilayered cybersecurity approach. Choose one that is reliable, doesn't interfere with your systems, and allows you to focus on your business. To decide which endpoint protection best suits you, ensure to do your research and refer to reviews by established and reputable organisations. Here are a few things to consider:

    Detection rates

    You want your security software to be able to detect any and all threats that enter your network. The problem is, of course, that most malware is designed to evade detection. Therefore, you won’t always know if something has penetrated the software’s defences unless your systems slow down or start behaving erratically, or alternatively, you regularly audit your network traffic.

     

    Independent test results might be your best guide here. Be especially wary of vendors who provide you with malware samples to test with – they tend to be customised, so their products automatically mark them as malicious. If you are planning on using real malware for testing purposes, keep it safe and use a dedicated test machine that is isolated from the rest of your network, with no valuable data stored on it. Alternatively, you can check real-world tests conducted by trusted organisations with a proven track record.

     

    Incidence of false positives

    A false positive is an alert on a file or link that isn’t actually malicious. Some in the security industry maintain that they’re not a big deal – they are. Just one false positive could cause serious problems. If an antivirus solution is configured to immediately delete or quarantine infected files, a false positive in an essential file can render the operating system or crucial applications unusable.

     

    Even if false positives don’t shut down your system, each one requires an investigation that wastes valuable IT resources. By choosing a product that keeps marking false positives, you’ll be spending a lot of time chasing down nonexistent threats, and possibly reimaging and restoring systems that don’t need to be touched at all.

     

    System footprint

    Security software varies widely in the amount of system resources required in terms of memory, disk space, processor load and network impact. During your evaluation, keep an open ear to user complaints. If antivirus updates or system scans noticeably impact system performance, you’ll hear about it as users see their systems slow down and it affects their ability to get work done.

     

    System slowdowns aren’t a price you have to pay for having security. And you shouldn’t have to upgrade older machines just to run the security software. AV-Comparatives regularly runs performance testing to compare the impacts endpoint solutions have on machines they are running on.

     

    Ease of management and maintenance

    Pay particular attention to this one. You don’t want to have to wear out your shoes running from one device to another to configure, administer, upgrade or maintain security across all the systems in your environment.

     

    Look for the ability to manage all endpoints (desktops, servers, virtual machines and even managed mobile devices) from a central console, from which you can push out updates, automate routine tasks such as creating and deploying configurations, and quickly create the reports you need.

     

    Managing IT security from the cloud is convenient and easy. It’s also cost effective, because there is no need for additional hardware or software. With a cloud-based console you can connect anytime from your favourite browser.

     

    Support response

    In case you run into any problems, it’s best to have a place where you can search for solutions. Look for a knowledge base that covers a variety of scenarios. It should be easy to navigate and detailed enough to quickly provide information on the necessary steps. If you need further assistance, there should be a simple way to contact technical support.

     

    To sum it up, the highest possible detection rate, lowest incidence of false positives, negligible impact on systems, easy management from a cloud console and high-quality support are the main aspects you should look for when choosing an endpoint solution.

     

    But there are also other things to consider, such as ease of deployment or costs. If your company uses devices with more than one operating system, also look for a solution with cross-platform support. No matter whether you use Windows, macOS or Linux, be sure your desired solution has you covered. Don’t rush – choosing an endpoint security solution is not just a technical decision, but a business decision as well.

     

    Where to look for reviews and ratings of endpoint protection:

    AV-Comparatives logo AV-Comparatives: Independent tests of antivirus software
    SE Labs logo SE Labs: Quarterly reports on endpoint protection and breach response solutions
    Virus Bulletin logo

    Virus Bulletin: The latest research and information for the security community

    G2 logo

    G2: Website offering over one million user reviews of software including endpoint security services

    GetApp logo GetApp: Premier online resource for businesses exploring software as a service products

    Read also

    How To Back Up Your Company’s Data: From Prevention to Recovery

    How To Back Up Your Company’s Data: From Prevention to Recovery

    Data is one of today’s most valuable commodities, yet 21% of small and medium-sized businesses still don’t have a backup or a disaster recovery plan. Needless to say, there are many ways you can lose data – and end up with a host of troubles to boot. That's why every business has to come up with a smart solution that meets its needs.

    7 Reasons for Small Businesses to Take Action on Cybersecurity

    7 Reasons for Small Businesses to Take Action on Cybersecurity

    As a general rule, humans are lazy. We follow the path of least resistance and the simplest route to success. Outside of their electronic screens and malicious coding, cybercriminals are humans too, trying to find the quickest way into your devices. If you assume your company’s size makes you go unnoticed, think again – for cybercriminals, SMBs are the easiest and most common targets.

    Want to Build a Cyber-Aware Culture? Find a Way to Pass on Knowledge Without Scaring Employees

    Want to Build a Cyber-Aware Culture? Find a Way to Pass on Knowledge Without Scaring Employees

    Cybersecurity education may be similar to taking an exam. First, you learn something, and if you do not use your knowledge for a long time, you forget it. That might be the effect of cybersecurity training for employees, which takes place once or twice a year and then continues with occasional presentations that no one understands.

    Cyberchology: The Human Element of Cybersecurity (+Downloadable eBook)

    Cyberchology: The Human Element of Cybersecurity (+Downloadable eBook)

    Stress affects different personality types in different ways, meaning each individual employee has their own specific blind spot when it comes to cybersecurity. In light of the COVID-19 pandemic, ESET and The Myers-Briggs Company release Cyberchology – The Human Element, a brand new report investigating the link between cybersecurity, personality and stress.