Endpoint Detection and Response (EDR)

Endpoint Detection and Response (EDR) is a security concept for protection against cyber incidents that combines software and human response. Software is installed on an endpoint, such as a computer, smartphone or tablet, which detects malware and anomalies (detection). Malware detected by the software is then isolated and prevented from executing. Anomalies can be reviewed by a human IT security expert and responded to with appropriate measures if necessary. (Response)

 

How exactly does endpoint detection and response (EDR) work?

This is how the two components of EDR work together:

Stage 1: ‘Detection’ by software on the endpoint

  • Intelligent antivirus protection scans all data entering the device for known malware.
  • Machine learning also enables variations of dangerous programs to be detected.

 

Stage 2: Response by a human

  • Conspicuous actions are automatically blocked. Unremarkable information is allowed to pass.
  • Suspicious activities that cannot be clearly classified as cyber attacks are recorded.
  • IT security experts can review the suspicious activities reported by the software.
  • If it is an attack, they can take appropriate measures.
  • In the event of major incidents, those affected are informed so that joint steps can be taken.

 

Where do I encounter EDR in my everyday work?

In most cases, you will not notice EDR working in your everyday work. All data, servers and the Internet are available to you as usual. Only if there is a serious attack on your company will the IT security experts contact you immediately and discuss the recommended course of action. How often this happens depends, among other things, on your industry, the size of your company and the level of cyber security in your company. To get an idea, simply ask for experience with comparable companies when setting up EDR.

 

What can I do to improve my security?

Once EDR has been set up, you only need to take action in the event of a serious attack. Your IT security experts will then give you the appropriate instructions.