Open33

エンドポイントセキュリティ(AV, NGAV, EPP, EDR, XDR,,,, DLP, MDR)

ピン留めされたアイテム

https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-protection

What Is Endpoint Protection?

How Does Endpoint Protection work?

Types of Endpoint Protection: EPP vs. EDR vs. XDR

Endpoint protection solutions are now commonly referred to as endpoint protection platforms (EPP), which are suites of cloud-based endpoint security solutions that provide more robust protection than individual endpoint security products like antivirus software. Legacy endpoint security is known for continuously scanning endpoints to identify malicious files, which can slow down performance.

Endpoint protection platforms may also provide the ability to detect and block malicious activity, and investigate and remediate any incidents that evade protection controls. This is known as endpoint detection and response (EDR). EDR continuously monitors end-user devices to detect and respond to cyberthreats like ransomware and malware.

The next evolution of endpoint protection is known as extended detection and response (XDR). XDR is a newer approach to endpoint security and offers improved protection, detection and response by integrating not just endpoint data but data from any source, such as network, cloud data or third-party data.

The Evolution of Endpoint Protection

1980s: Antivirus

Endpoint security has evolved beyond the basic capabilities provided by antivirus tools back in the 1980s, which scanned endpoint files for malware.

2000s: Next-Generation Antivirus (NGAV)

To combat new forms of malware, machine learning and behavioral threat protection was introduced to create more effective next-gen antivirus in the early 2000s.

2010s: Endpoint Protection Platform (EPP)

EPP combines antivirus or next-gen antivirus, personal firewall, encryption, USB device control, vulnerability assessment and more to deliver a full platform to stop malware from penetrating endpoints.

2015: Endpoint Detection and Response (EDR)

Gartner Analyst Anton Chuvakin coined the term "endpoint threat detection and response" to describe "the tools primarily focused on detecting and investigating suspicious activities" on endpoints in 2013. This name had evolved to endpoint detection and response by 2015.

2021: Extended Detection and Response (XDR)

While the concept of XDR was first introduced in 2019 by Palo Alto Networks, XDR is considered an emerging technology that is quickly gaining traction in the endpoint security market. While most technology providers now offer endpoint security offerings that combine EPP/EDR capabilities, most do not offer a true XDR solution that combines many data sources into one platform for analysis and remediation.

Endpoint Protection - Palo Alto Networks

  1. Antivirus; AV
  2. Next-Generation Antivirus; NGAV
  3. Endpoint Protection Platform; EPP
  4. Endpoint Detection and Response; EDR
  5. Extended Detection and Response; XDR
  • Data Loss Prevention; DLP?
  • Managed Detection and Response; MDR?

https://www.jbsvc.co.jp/useful/security/what-is-endpoint-security.html

対策の一例

HDD暗号化
マルウェア検知
振る舞い検知
ID管理
私物端末からのアクセス時の検疫機能

このようなエンドポイントセキュリティ対策を行い、適切に運用していくことで、社内・社外のPCやタブレット、スマートフォンなどの端末とその中の情報を、サイバー攻撃の脅威から守りましょう。

https://www.jbsvc.co.jp/useful/security/endpoint_vocabulary.html

目次

  • AV(Antivirus)/EPP(Endpoint Protection Platform)とは?
  • NGAV(Next Generation Antivirus)/NGEPP(Next Generation Endpoint Protection Platform)とは?
  • EDR(Endpoint Detection and Response)とは?
  • DLP(Data Loss Prevention)とは?
  • まとめ(比較表はこちら)

AV(Antivirus)/EPP(Endpoint Protection Platform)

AVまたはEPPとは、コンピュータウイルスからパソコンなどの機器を守るためのソフトウェア総称で、「アンチウイルスソフトウェア」や「ウイルス対策ソフトウェア」のことを指します。
アンチウイルスソフトウェアではパターンマッチング技術が検出手法として用いられております。

主なメーカー

Trend Micro
Symantec
McAfee
ESET
Kaspersky Lab
F-secure
Sophos
Microsoft


NGAV(Next Generation Antivirus)/NGEPP(Next Generation Endpoint Protection Platform)とは

NGAVまたはNGEPPとは、マルウェア特有の動作を手がかりにマルウェアを検知するソフトウェアのことを指します。
これは従来のAV・EPPで使われたパターンマッチング技術とは異なり、振る舞い検知やAI・機械学習といった技術を用いてマルウェアと疑わしいものを検知・ブロックを行い、パソコンをマルウェア感染から守ります。

主なメーカー

Palo Alto Networks
FFRI
Cylance
SentinelOne
Blue Planet-works


EDR(Endpoint Detection and Response)とは

EDRとは、パソコンなどエンドポイントの操作や動作を記録・監視を行い、サイバー攻撃を発見次第すぐに対処することを目的としたソフトウェア総称です。

これは、NGAVやNGEPPを潜り抜けたサイバー攻撃を受けてしまった場合を想定し、万が一攻撃を受けたとしても被害を最小限にすること狙っています。

また、サイバー攻撃を検知・対処した後も、被害にあった原因の調査や今後のセキュリティ対策に反映させる必要があるため、運用が重要なポイントになります。

主なメーカー

Palo Alto Networks
Cybereason
Fortinet
Carbon Black
CrowdStrike
Cisco
FireEye
Tanium


DLP(Data Loss Prevention)とは

DLPとは、一言で表すとデータに着目した情報漏洩対策のことです。

主なメーカー

Digital Guradian

https://jp.ext.hp.com/techdevice/wolf/endpointsecurity/

エンドポイントでのセキュリティ対策にはどのようなものがあるか

EPP(Endpoint Protection Platform)

「EPP(Endpoint Protection Platform)」は、「Malware(マルウェア)」のシグネチャファイルを使ったパターンマッチングで既知の脅威を検出・ブロックします。いわゆる従来のウイルス対策ソフトにこの手法を使う製品が多く存在します。

EDR(Endpoint Detection and Response)

監視対象となるエンドポイントに専用のエージェントソフトウェアを導入し、そのログを常時取得。データはサーバ上に集約・分析され、不審な挙動が発見された際は即座にシステム管理者へ通知が行われます。管理者側では、ログの精査によって原因や影響範囲を特定できるため、標的型攻撃やランサムウェアなど各種サイバー攻撃への迅速かつ効率的な対応が可能です。

NGAV(Next Generation Antivirus:次世代アンチウイルス)

パターンマッチングをすり抜ける新種や亜種など未知の脅威に対して、AI(Artificial Intelligence:人工知能)や機械学習、振る舞い解析などを用いた検出方法です。「NGEPP(Next Generation Endpoint Protection Platform)」とも呼ばれることもあります。

DLP(Data Loss Prevention)

いわゆる情報漏えい対策のための仕組みがDLPと呼ばれるものになります。不正ユーザーの振る舞いを制限または監視していましたが、DLPではデータそのものを監視し、不正な操作やアクセスが無いかを判断します。

https://sol.conexio.co.jp/blog/security/edr

EDR(Endpoint Detection and Response)とは、サイバー攻撃に対してエンドポイントでの検出や対応を行うセキュリティソフトウェアです。標準型攻撃はもちろん、ランサムウェアによる被害にも対応します。

2013年に誕生した比較的新しい定義で、ホスト/エンドポイントを常時監視し、不審な挙動やその痕跡を検出した場合は分析処理による調査と管理者への報告が行われる仕組みです。

https://www.itreview.jp/categories/edr#tutorial

EDRの基礎知識

EDR(Endpoint Detection and Response)とは、エンドポイント端末(利用者端末)向けのセキュリティ・ソリューションだ。エンドポイントでの監視を強化し、端末内に侵入したランサムウェアや標的型攻撃などのサイバー攻撃を検出することが目的だ。エンドポイント端末から収集した動作情報(ファイルやプロセスの挙動/レジストリの変更/ネットワーク通信の情報/その他)の解析や分析などを行い、挙動の異常からマルウェア感染や侵入を検知。エンドポイント端末の隔離やシステム停止などを行うことで、重大な社内システムへの影響を防ぐ。「ウイルス感染を前提としたセキュリティ対策」実現を支援するソリューションである。

https://www.crowdstrike.com/cybersecurity-101/endpoint-security/

What is Endpoint Security?

Endpoint security, or endpoint protection, is the cybersecurity approach to defending endpoints – such as desktops, laptops, and mobile devices – from malicious activity.

According to Gartner, an endpoint protection platform (EPP) is a solution used to “prevent file-based malware attacks, detect malicious activity, and provide the investigation and remediation capabilities needed to respond to dynamic security incidents and alerts.”

What’s considered an endpoint?

An endpoint is any device that connects to the corporate network from outside its firewall. Examples of endpoint devices include:

  • Laptops
  • Tablets
  • mobile devices
  • Internet of things (IoT) devices
  • Point-of-sale (POS) systems
  • Switches
  • Digital printers
  • Other devices that communicate with the central network

Why Endpoint Security is Important

An endpoint security strategy is essential because every remote endpoint can be the entry point for an attack, and the number of endpoints is only increasing with the rapid pandemic-related shift to remote work.

How Endpoint Protection Works

Endpoint protection solutions work by examining files, processes, and system activity for suspicious or malicious indicators.

Endpoint Protection Software vs. Antivirus Software

Endpoint security software protects endpoints from being breached – no matter if they are physical or virtual, on- or off-premise, in data centers or in the Cloud.

Antivirus is often part of an endpoint security solution and is generally regarded as one of the more basic forms of endpoint protection. Instead of using advanced techniques and practices, such as threat hunting and endpoint detection and response (EDR), antivirus simply finds and removes known viruses and other types of malware.

Core Functionality of an Endpoint Protection Solution

Endpoint security tools that provides continuous breach prevention must integrate these fundamental elements:

  1. Prevention: NGAV

Next-generation antivirus (NGAV) closes that gap by using more advanced endpoint protection technologies, such as AI and machine learning, to identify new malware by examining more elements, such as file hashes, URLs, and IP addresses.

  1. Detection: EDR

To prevent silent failures, an Endpoint Detection and Response (EDR) solution needs to provide continuous and comprehensive visibility into what is happening on endpoints in real time.

  1. Managed Threat Hunting

Managed threat hunting is conducted by elite teams that learn from incidents that have already occurred, aggregate crowdsourced data, and provide guidance on how best to respond when malicious activity is detected.

  1. Threat Intelligence Integration

To stay ahead of attackers, businesses need to understand threats as they evolve. Sophisticated adversaries and advanced persistent threats (APTs) can move quickly and stealthily, and security teams need up-to-date and accurate intelligence to ensure defenses are automatically and precisely tuned.

A threat intelligence integration solution should incorporate automation to investigate all incidents and gain knowledge in minutes, not hours. It should generate custom indicators of compromise (IoCs) directly from the endpoints to enable a proactive defense against future attacks.

The Importance of Cloud-Based Architecture

  1. Single, lightweight agent
  2. Machine Learning
  3. Enhanced Manageability
  4. Protection On or Off Network

CrowdStrike’s Advanced Endpoint Protection

CrowdStrike offers a new approach to endpoint security. Unlike traditional security or network security solutions, CrowdStrike’s endpoint security solution unifies the technologies required to successfully stop breaches, including true next-gen antivirus and endpoint detection and response (EDR), managed threat hunting, and threat intelligence automation, delivered via a single lightweight agent. Falcon Enterprise includes the following modules:

https://www.crowdstrike.com/cybersecurity-101/endpoint-protection-platforms/

What is an Endpoint Protection Platform?

Traditional vs. Cloud-native platforms

EPP vs. EDR

Endpoint detection and response (EDR) is just one component of an endpoint protection platform. On the other hand, an endpoint protection platform is made up of many cybersecurity technologies, including next-gen antivirus, threat intelligence, vulnerability management, and EDR.
A fully-featured EPP integrates an EDR solution to offer detection capabilities. Baking in EDR allows an endpoint protection platform to mitigate a breach that is uncovered. This could mean containing the exposed endpoints to stop the breach in its tracks, allowing remediation to take place before damage occurs. Read EPP vs. EDR >

How to Choose an Endpoint Protection Platform

Endpoint Protection Vendors

CrowdStrike’s Endpoint Protection Platform

https://www.crowdstrike.com/cybersecurity-101/endpoint-security/epp-vs-edr/

EPP VS. EDR

When evaluating their cybersecurity needs and options, many organizations may find themselves asking:

Which is better: An endpoint protection platform (EPP) or an endpoint detection and response (EDR) solution?

In fact, this is a false choice. EPP and EDR are two critical and distinct components within a comprehensive cybersecurity strategy. While the two are closely related, they cannot be used interchangeably; nor does having one lessen or negate the need for the other.

In this article, we explore the relationship between these two crucial cybersecurity capabilities and address some of the most common misconceptions that organizations may have as they navigate the complex and crowded security solution landscape.

What is an endpoint protection platform (EPP)?

An endpoint protection platform (EPP) is a suite of endpoint security technologies such as antivirus, data encryption and data loss prevention that work together on an endpoint device to detect and prevent security threats like file-based malware attacks and malicious activity. They also have the capability to provide investigation and remediation in response to dynamic security incidents. Advanced EPP solutions use multiple detection techniques and are mainly cloud-managed and assisted by cloud data.

What is endpoint detection and response (EDR)?

Endpoint detection and response (EDR), also referred to as endpoint detection and threat response (EDTR), is an endpoint security solution that continuously monitors end-user devices and workloads to provide continuous and comprehensive visibility into what is happening on endpoints in real time. This allows cybersecurity teams to quickly and effectively detect and respond to cyber threats like ransomware and malware.

3 Common Misconceptions About EPP and EDR

Misconception 1: Organizations must choose between EPP and EDR.

Truth: Organizations need not make a binary choice between EPP or EDR

Misconception 2: EPP is a passive form of prevention.

Truth: EPP stands for endpoint protection platform, not passive prevention.

Misconception 3: A standalone EDR is enough.

Truth: An EDR solution helps security teams understand what is happening across the network at the endpoint level, which can in turn help them identify and remediate attacks. However, to defend against most modern cyberattacks, it is necessary to employ a much broader and more comprehensive array of capabilities to protect the organization, including those powered by both human intelligence and supplemental technologies.

What are the critical elements of comprehensive EPP?

EDR is one of the foundational elements within an EPP.

What should organizations look for in an EDR solution?

Conclusion: A comprehensive cybersecurity strategy and solution

CrowdStrike’s Endpoint Protection Platform

Powered by the CrowdStrike Security Cloud, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.

https://www.crowdstrike.com/cybersecurity-101/endpoint-security/edr-vs-mdr-vs-xdr/

EDR VS MDR VS XDR

Cyberattacks have become more common, more advanced and more costly, which is driving
the need for a comprehensive cybersecurity strategy. Central to every security strategy is a detection and response capability which catches threats that have circumvented traditional security measures. Here we explore three main detection and response tools:

Endpoint Detection and Response (EDR)

Managed Detection and Response (MDR)

Extended Detection and Response (XDR)

https://www.cisco.com/c/en/us/products/security/endpoint-security/index.html

What is endpoint security?

Endpoint security solutions protect endpoints such as mobile devices, desktops, laptops, and even medical and IoT devices. Endpoints are a popular attack vector, and the goal of an attacker is to not only compromise the endpoint but also to gain access to the network and the valuable assets within.

Types of endpoint security

Attackers stay up to date on security trends in order to create stealthier attacks, rendering legacy antivirus obsolete. Endpoint security combines the preventive protection of an EPP solution as well as the detection and investigative features of an EDR.

Endpoint protection platform (EPP)

Endpoint detection and remediation (EDR)

Extended detection and response (XDR)

https://www.fortinet.com/resources/cyberglossary/what-is-endpoint-security

What Is Endpoint Security Threat Prevention?

Why Is Endpoint Security Important?

  1. Protecting all endpoints
  2. Securing remote working
  3. Sophisticated threat protection
  4. Protecting identity

Endpoint Protection vs. Antivirus: What Is the Difference?

Antivirus software helps businesses detect, eliminate, and prevent malware from infecting devices. Antivirus solutions are installed directly on endpoint devices, such as laptops, PCs, network servers, and mobile devices. These solutions detect malware by scanning files and directories to discover patterns that match the definitions and signatures of a virus. They can also only recognize known threats and must be updated to detect the latest malware strains.

Endpoint security threat prevention is fundamentally different from the approach of antivirus software. Instead of protecting an individual device, endpoint security solutions protect the entire business network, including all of the endpoints connecting to it.

There are several significant differences between endpoint protection and antivirus software. These include:

  1. Device coverage
  2. Protection from threats
  3. Continuous protection
  4. Advanced internal protection
  5. Admin control
  6. Enterprise-wide control
  7. Integration

How Does Endpoint Security Work?

What Is an Endpoint? - Endpoint Definition

What Are the Components of Endpoint Security Software?

What is the Difference Between Endpoint Security and a Firewall?

How Fortinet Can Help?

https://www.gartner.com/reviews/market/endpoint-protection-platforms

Gartner Peer Insights

EPP Reviews and Ratings


What is an Endpoint Protection Platform (EPP)?

An Endpoint Protection Platform (EPP) is a solution deployed on endpoint devices to prevent file-based malware, to detect and block malicious activity from trusted and untrusted applications, and to provide the investigation and remediation capabilities needed to dynamically respond to security incidents and alerts.

How these categories and markets are defined

--

Products In Endpoint Protection Platforms (EPP) Market

https://www.gartner.com/reviews/market/endpoint-detection-and-response-solutions

Gartner Peer Insights

Endpoint Detection and Response (EDR) Solutions Reviews and Ratings

What are EDR (Endpoint Detection and Response) Solutions?

The Endpoint Detection and Response Solutions (EDR) market is defined as solutions that record and store endpoint-system-level behaviors, use various data analytics techniques to detect suspicious system behavior, provide contextual information, block malicious activity, and provide remediation suggestions to restore affected systems. EDR solutions must provide the following four primary capabilities: • Detect security incidents • Contain the incident at the endpoint • Investigate security incidents • Provide remediation guidance


Products In Endpoint Detection and Response (EDR) Solutions Market

https://www.g2.com/categories/endpoint-protection

Endpoint Protection Software Features

  • Device Control — Manages user network accessibility on laptops and mobile devices.
  • Web Control — Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network.
  • Application Control — Blocks endpoint users from accessing restricted applications.
  • Asset Management — Keeps records of each network asset and its activity. Discovers new assets accessing the network.
  • System Isolation — Cuts off network connection or temporarily deactivates applications until incidents are remedied.
  • Endpoint Intelligence — Analysis for users to examine threat intelligence data specific to their endpoint devices.
  • Firewall — Protects endpoint devices from a variety of attacks and malware threats.
  • Malware Detection — Provides multiple techniques and information sources to alert users of malware occurrences.
  • Incident Reports — Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
  • Security Validation — The product has a recurring examination process to update your intelligence reports as new threats emerge.
  • Compliance — Monitors assets and enforces security policies to audit asset and infrastructure security.

Popular Endpoint Protection Software Categories

https://www.sophos.com/en-us/content/what-is-ngav

What is the difference between NGAV and XDR?

NGAV is a combination of AI and machine learning with an emphasis on prevention. It’s able to protect against file-less attacks, unlike legacy antivirus.

XDR is an advancement of EDR that is designed to assess information outside of individual endpoints. If an attack were to get past NGAV and you don’t have XDR as an added safety measure, your systems become vulnerable to attack. NGAV is great for endpoint security, but it doesn’t easily work across multiple endpoints. This is where XDR steps in, as it has a greater scope.

https://comtact.co.uk/endpoint-protection-epp-vs-edr-whats-the-difference/

Endpoint Protection EPP vs EDR: What’s the difference?

Cyber security is rife with acronyms and confusing overlapping terminology. It makes it difficult to pinpoint exactly what you need to keep your user ‘endpoints’ safe.

AV, NGAV, EPP, EDR – what does it all mean?

What does it all do? Here, we’re going to break it down and explain some of the fundamental differences and similarities for you.

Firstly, let’s spell out the acronyms:

https://www.lanscope.jp/cpms/blog/21995/?utm_source=google&utm_medium=cpc&utm_campaign=g_blackberry_general&utm_term=blackberry_edr&utm_content=0000918&gclid=CjwKCAjwlqOXBhBqEiwA-hhitD-6nBq-OGVvaZUEh76H9NlCW_mLNBE8PhXt1-IGwMYj7FUoB1W0iBoCMfoQAvD_BwE

EDR(Endpoint Detection and Response)とはなにか?

企業ネットワークにつながるサーバ・PC・スマートフォンなどのネットワーク端末は、エンドポイントと呼ばれて常にサイバー攻撃の脅威にさらされています。

エンドポイントのセキュリティ対策として重要なのが、EPP(Endpoint Protection Platform)とEDR(Endpoint Detection and Response)です。

EPPが「Protection=保護・防護」 に重きを置いているのに対して、EDRは「Detection=検出・探知」と「Response=応答・対応」 を重視しています。

https://cn.teldevice.co.jp/column/31804/

EDRをさらに進化したXDRとは?エンドポイント対策の最前線


ランサムウェア対策の最前線で注目を集めるXDRとは何か

そこで近年では、EDR(Endpoint Detection & Response:エンドポイント検知・対処)製品を導入して、従来行ってきたネットワークセキュリティに代わる保護機能をエンドポイントで実行していくことが求められています。現実的には、完全なテレワーク下で脅威に対抗していくためには、EDRしか手だてがないとさえ言われています。

しかし、EDRにも課題があります。それは検知した脅威情報をどう管理し、どう対処していくかなど運用負担が大きいということです。世の中に存在する多くのEDRは、単に導入するだけでは脅威検知の部分しか実現できず、発生したインシデントへの対応や脅威ハンティングの部分は、人手に頼らざるを得ないのが実情です。そもそもEDRの運用では脅威情報に関する大量のアラートが通知されるため、その対処だけでもままならないという状況があります。

そうした中で、従来のEDRの課題を解消するべく同ソリューションをさらに進化させたコンセプトが 「XDR(eXtended Detection & Response)」 です。SentinelOne Japanのセールスエンジニアの富田隆一氏は「XDRという言葉にはさまざまな定義があり、理解のされ方も異なります。XDRが何でありどのように脅威を対処するのかを正しく把握することが重要になってきます」と強調します。


XDRの目標は「攻撃者のTTPsを検知し、素早く封じ込めること」

富田氏によると、XDRの目標は「攻撃者のTTPsを検知し、素早く封じ込めること」にあるといいます。
TTPsとはTactics Techniques & Proceduresの略であり、その訳の通り、いかに攻撃者の戦略・技術・手順を検知できるかがカギとなります。

https://www.hysolate.com/learn/endpoint-security/edr-vs-epp-key-features-differences-using-them-together/

EDR vs EPP: Key Features, Differences, and How They Work Together

What is EDR?

What is EPP?

Key Features of EPP and EDR Solutions

Key Features of an EDR Solution

EDR vs EPP: What’s the Difference?

EPP vs EDR: Which Should You Choose?

Why Choose EDR?

Endpoint detection and response provides intelligent detection and visibility. Experienced staff can filter false positives, find actionable data, and detect threats early. Most importantly, EDR makes it possible to respond to attacks on endpoints if other security measures fail.

Why Choose EPP?

EPP performs monitoring and threat detection provides monitoring and protection for endpoints. It requires little oversight and is easily managed by a qualified IT team. Unlike EDR, it does not require regular monitoring. If hosted in the cloud, it uses fewer resources and can be accessed from anywhere.

Endpoints are one of the most important assets for enterprises to monitor security threats. While EPP is reactive and designed to prevent attacks from common threat sources, EDR lets your organization respond faster and empowers security teams to take action and contain or stop the threat.

A combination of both EPP and EDR is best for most enterprise organizations. Many EPPs recognize this, by including an EDR feature as part of their platform. The best solution for your organization will depend on factors such as vulnerability, budget, and tolerance to risk for specific endpoints and the network at large.

Enhancing Endpoint Security with Hysolate

https://www.criticalstart.com/epp-vs-edr-vs-mdr-endpoint-security-solutions-compared/

What is EDR? And EDR vs. MDR vs. EPP – Security Compared

Proactive vs. Reactive Endpoint Security

Really, there are two kinds of security practitioners in the world right now:

Proactive: Those who don’t like to ever spill the milk (aka those that want to make sure nothing malicious ever runs on an endpoint, or threat prevention); and
Reactive: Those that know the milk will spill, so they’d better get ready to clean it up (aka detect when something malicious does execute and have a plan to remediate it).

EPPは牛乳パック

EDRはコップに入った牛乳

https://www.ashisuto.co.jp/security_blog/article/201907-epp-edr.html

EPPとは

EPP(Endpoint Protection Platform:エンドポイント保護プラットフォーム)は、マルウェア感染を防止することに特化した製品です。組織内に侵入したマルウェアを検知し、自動的に駆除したりマルウェアが実行されないようにする機能を提供します。

EDRとは

EDR(Endpoint Detection and Response:エンドポイントでの検出と対応)は、マルウェアの感染防止を目的としているEPPとは異なり、マルウェア感染後の対応を支援する製品です。

https://www.cybereason.co.jp/blog/xdr/7104/

XDRとは何か?〜XDRの基礎知識とAdvanced XDR

XDR(Extended Detection and Response)とは

XDR(Extended Detection and Response)とは、EDR(Endpoint Detection and Response)の機能を拡張することで、エンドポイントだけでなく、ネットワーク、アプリケーションスイート、ユーザーペルソナ、オンプレミスのデータセンター、クラウドでホスティングされているワークロード全体を通じて、サイバー攻撃の検知と防止を実現できるようにするセキュリティアプローチです。

ログインするとコメントできます