Antivirus and EDR
Antivirus software is intended to prevent, detect, and remove viruses and other harmful software, like malware and spyware. It scans files and programs for known malicious signatures. From a security perspective, antivirus software should at least be implemented as a primary defense to safeguard your systems. This software operates automatically in the background, continually scanning for malicious activities.
Endpoint Detection and Response
Endpoint Detection and Response (EDR) is a cybersecurity solution that combines Next-Gen Antivirus (NGAV) with continuous monitoring of endpoint devices. By analysing endpoint data in real time, this system detects and mitigates cyber threats. It offers a platform for internal IT teams to contain, investigate, and remediate compromised systems.
NextGen Anti-virus
Next-Gen Antivirus (NGAV) employs an array of innovative technologies to combat both known and unknown threats. It captures known malware and identifies stealthy actions whether endpoints are connected to the network or offline, utilising artificial intelligence, behavioral detection, and machine learning algorithms. By focusing on the tactics, techniques, and procedures (TTPs) of adversaries rather than relying solely on file signatures like traditional (legacy) antivirus solutions, NGAV effectively stops rapidly evolving threats.
Mobile Device Management (MDM)
MDM allows you to safeguard and control all your endpoints from a unified platform, overseeing user access to applications and managing devices.
Layers of Security
Identities: Manages user access to corporate devices and applications.
Applications: Manage M365 apps and files in OneDrive & SharePoint, from deployment to removal, on corporate and BYOD devices (e.g. iPhone).
Devices: Ensure devices meet compliance requirements, from ensuring proper passwords to specific security software being deployed.
Typical scenarios:
Identities: You can implement a policy that requires multi-factor authentication (MFA) for employees to access corporate data. Access will be denied until the MFA requirement is satisfied.
Applications: You can require employees to use Microsoft Office mobile apps to access corporate data on their personal iPhone or Android devices. If an employee departs the company or if their device is lost or stolen, you can remotely erase the Microsoft Office mobile apps from that device.
Devices: Mobile Device Management (MDM) allows you to restrict access to corporate data exclusively to devices managed by your organization. Through a conditional access policy, these devices can either be corporate-owned or personal devices that your organization permits.