Sector: Enterprise
Endpoint protection needs your attention
How to get out more than you put in
Our reports help you choose the best enterprise endpoint protection for your organisation. Picking a suitable solution isn’t just a matter of scanning through testing awards. You need to look closely at what you need, what you already have and what is available.
Choose the best enterprise endpoint protection
If you were going to buy a new security fence, burglar alarm or CCTV system you would research the various options and consider how to deploy it in your very specific situation. The same should follow for endpoint protection systems. What do you really need? Are the candidates basically capable? And can you get the best out of them in your environment. We hope this report helps you answer some of these important questions.
We pride ourselves on a level of transparency that elevates our work above the less open reports available. But don’t just take our word for it. This enterprise endpoint protection report has gone through the AMTSO certification process. This ensures that we say what we’re going to do; do it; and can prove it. Our results help vendors improve their products and buyers choose the best anti-malware solution for their own needs.
SE Labs tested BlackBerry Protect and Optics in this Breach Response test. We pitted it against a range of hacking attacks designed to compromise systems and penetrate target networks. These are the same techniques criminals and other attackers use to breach systems and networks in the real world.
Breach Response Test: BlackBerry Protect
Testers used full chains of attack, meaning that they behaved as real attackers. We probed targets using a variety of tools, techniques and vectors before attempting to gain lower-level and more powerful access.
Finally, the testers/ attackers attempted to complete their missions. This might include stealing information, damaging systems and connecting to other systems on the network.
Tested products from:
The world of cyber security sales is unclear at best
Our reports help you choose the best enterprise endpoint protection for your organisation. This latest one looks at how the most popular products handle the threats everyone faces on a daily basis, as well as the sort of targeted attack you hope never to encounter (but might).
Our testing is rigorous and tough. It’s hard to do well in an SE Labs test.
There aren’t many resources available to help make such buying decisions. Security marketing is fraught with misleading claims. That’s not just our opinion. “Snake oil” is a common refrain among attendees of security conferences and the large companies that buy security to the tune of over one trillion dollars a year.
Choose the best enterprise endpoint protection
SE Labs is particularly well connected in the security world. It’s partially how we have gained the trust of the security vendors themselves, and their own customers. We sit right in the middle of things, alongside the analysts who help businesses choose which vendors to work with. The work we do provides insight into which products are right for different companies, which all have different needs.
We pride ourselves on a level of transparency that elevates our work above the less open reports available. But don’t just take our word for it. This enterprise endpoint protection report has gone through the AMTSO certification process. This ensures that we say what we’re going to do; do it; and can prove it. Our results help vendors improve their products and buyers choose the best anti-malware solution for their own needs.
SE Labs tested CrowdStrike Falcon in this Breach Response test. We pitted it against a range of hacking attacks designed to compromise systems and penetrate target networks. These are the same techniques criminals and other attackers use to breach systems and networks in the real world.
Testers used full chains of attack, meaning that they behaved as real attackers. We probed targets using a variety of tools, techniques and vectors before attempting to gain lower-level and more powerful access.
Finally, the testers/ attackers attempted to complete their missions. This might include stealing information, damaging systems and connecting to other systems on the network.
2020: year of the breach
Solid endpoint protection is a bare minimum
If it feels like new breaches are reported every week it’s because they are. Attackers are taking no prisoners and are successfully breaking into businesses, political organisations and systems belonging to individuals.
Backups are important but they are not always the perfect solution. Recent attackers have been deleting backups and there are ways to damage offline backups held securely on tape, as we discussed in our article.
You can’t rely on just one type of security solution. However, having solid endpoint protection in place is one of a few bare-minimum measures you need to take. Most of the products in this security test report are excellent at providing a much-needed level of protection on personal and business computers.
We recommend you read through our test results in detail and consider how confident you are that your current choice will stand up against real-world security threats.
Read this SE Labs assessment of world-leading endpoint security products and discover how they handle well-known threats and targeted attacks.
Hands up, who’s been hacked?
Get ahead in the game that never ends
Have you ever been hacked? You, personally, or your business? If your answer is, “no” it would be interesting to know how you can be so sure.
Keeping your wits about you is essential, but you can’t do it all on your own. That’s why a good (anti-malware) endpoint protection solution is an essential basis for your online protection. We hope this report helps you or your business get ahead in the game that never ends.
SE Labs tested Crowdstrike Falcon in this Breach Response test, pitting it against a range of hacking attacks designed to compromise systems and penetrate target networks in the same way as criminals and other attackers breach systems and networks.
Full chains of attack were used, meaning that testers behaved as real attackers, probing targets using a variety of tools, techniques and vectors before attempting to gain lower-level and more powerful access.
Finally, the testers/ attackers attempted to complete their missions, which might include stealing information, damaging systems and connecting to other systems on the network.
SE Labs tested SentinelOne in this Breach Response test, pitting it against a range of hacking attacks designed to compromise systems and penetrate target networks in the same way as criminals and other attackers breach systems and networks.
Full chains of attack were used, meaning that testers behaved as real attackers, probing targets using a variety of tools, techniques and vectors before attempting to gain lower-level and more powerful access.
Finally, the testers/ attackers attempted to complete their missions, which might include stealing information, damaging systems and connecting to other systems on the network.
In our second annual report we review the unprecedented year of 2020, announce our annual awards winners and discuss testing like hackers.
You can find out all about the exciting new Breach Response and Email Security Services Protection tests. And learn that even security testers can use machine learning to make testing better, while still testing like hackers.
We will explain who we work with, to try and improve everyone’s security in this time of uncertainty. We’ll also explore how security testing has improved (or not) over the last 12 months and suggest ways in which you can use us better to help you personally or your organisation.
Awards winners and testing like hackers
Our annual award winners announcement shows who has impressed us the most since our last annual report.
And if you are new to security testing, we explain what the full attack chain is, and why you should use it when assessing security products.
Next-gen security testing for next-gen products.
Read this SE Labs assessment of world-leading endpoint security products and discover how they handle well-known threats and targeted attacks.