Endpoint Guia de Comprador 2019
Endpoint Guia de Comprador 2019
Endpoint Guia de Comprador 2019
Buyers Guide
As cyber threats become ever more complex, the pressure
to have the right endpoint solution in place has also grown.
However, the endpoint security marketplace has become
congested with many different solutions, and is so full of
indefensible marketing claims that making an educated
decision for your organization is increasingly difficult.
This guide provides clarity by walking you through
the key endpoint security technologies to ensure you
have the right protection in place. It also enables you
to see how different vendors stack up in independent
tests, helping you make an informed choice.
Endpoint Security Buyers Guide
However, protection alone is not enough. Four out of five organization admit having a shortage of internal
security expertise*. With this in mind usability is also essential if hard-pressed IT teams are to make best
use of the protection capabilities.
You should also assume that a threat will get through your defenses and equip your organization
accordingly. This includes having full visibility into how threats enter the organization, where they went, and
what they touched so that you can neutralize the attack and plug any security gaps.
Use this guide to understand the protection technologies available and make and informed choice of
endpoint protection products.
Endpoint Threats
While the threat landscape is constantly evolving, below are some key endpoint threats to consider when
evaluating different solutions:
ÌÌ Portable executables (malware): When endpoint protection is considered, malicious software programs
(malware) is often the primary concern. Malware includes both known as well as never-seen-before
malware. Often, solutions struggle to detect the unknown malware. This is important, as SophosLabs
sees approximately four hundred thousand pieces of unknown malware every day. Solutions should be
adept at spotting packed and polymorphic files that have been modified to make them harder to identify.
ÌÌ Potentially unwanted applications (PUA): PUAs are applications that are not technically malware,
but are likely not something you want running on your machine, such as adware. PUA detection has
become increasingly important with the rise of cryptomining programs used in cryptojacking attacks.
ÌÌ Ransomware: More than half of organizations have been hit by ransomware in the past year, costing on
average $133,000 (USD)2. The two primary types of ransomware are file encryptors and disk encryptors
(wipers). File encryptors are the most common, which encrypt the victim’s files and holds them for
ransom. Disk encryptors lock up the victim's entire hard drive, not just the files, or wipes it completely.
ÌÌ Exploit-based and file-less attacks: Not all attacks rely on malware. Exploit-based attacks
leverage techniques to take advantage of software bugs and vulnerabilities in order gain access
and control of your computer. Weaponized documents (typically a Microsoft Office program
that has been crafted or modified to cause damage) and malicious scripts (malicious code
often hidden in legitimate programs and websites) are common types of techniques used in
these attacks. Other examples include man-in-the-browser attacks (the use of malware to
infect a browser, allowing attackers to view and manipulate traffic) and malicious traffic (using
web traffic for nefarious purposes, such as contacting a command-and-control server).
*
Seven Uncomfortable Truths of Endpoint Security, March 2019. An independent survey of 3,100 IT Managers in 12 countries, commissioned by Sophos
October 2019 2
Endpoint Security Buyers Guide
ÌÌ Active adversary techniques: Many endpoint attacks involve multiple stages and multiple
techniques. Examples of active adversary techniques include privilege escalation (methods
used by attackers to gain additional access in a system), credential theft (stealing user names
and passwords), and code caves (hiding malicious code inside legitimate applications).
Foundational capabilities:
ÌÌ Anti-malware/antivirus: Signature-based detection of known malware.
Malware engines should have the ability to inspect not just executables but
also other code such as malicious JavaScript found on websites.
ÌÌ Web protection: URL lookup and blocking of known malicious websites. Blocked
sites should include those that may run JavaScript to perform cryptomining, and
sites that harvest user authentication credentials and other sensitive data.
ÌÌ Data loss prevention (DLP): If an adversary is able to go unnoticed, DLP capabilities would be
able to detect and prevent the last stage of some attacks, when the attacker is attempting
to exfiltrate data. This is achieved by monitoring a variety of sensitive data types.
Modern capabilities:
ÌÌ Machine learning: There are multiple types of machine learning methods, including deep
learning neural networks, random forest, bayesian, and clustering. Regardless of the
methodology, machine learning malware detection engines should be built to detect both
known and unknown malware without relying on signatures. The advantage of machine
learning is that it can detect malware that has never been seen before, ideally increasing
the overall malware detection rate. Organizations should evaluate the detection rate, the
false positive rate, and the performance impact of machine learning-based solutions.
October 2019 3
Endpoint Security Buyers Guide
ÌÌ Process protection (code cave): Prevents use of techniques such as code cave and
AtomBombing often used by adversaries looking to take advantage of the presence of legitimate
applications. Adversaries can abuse these calls to get another process to execute their code.
ÌÌ Endpoint detection and response (EDR)/root cause analysis: EDR and other analytical
tools are not focused on preventing attacks, but rather analyzing and responding
to previously detected incidents. Some also offer hunting capabilities to discover
attacks that previous went unnoticed. It is important to match the size and skillset of
your IT team with the complexity and ease of use of the tool being considered.
As part of an endpoint security evaluation, ask different vendors what techniques are included in
their solution. How strong are each of their components? What threats are they built to stop? Do
they rely only on one primary technique? What if it fails?
October 2019 4
Endpoint Security Buyers Guide
October 2019 5
Endpoint Security Buyers Guide
October 2019 6
Endpoint Security Buyers Guide
100% 100%
50% 50%
ACCURACY / FP
ACCURACY / FP
ACCURACY / FP
ACCURACY / FP
ACCURACY / FP
ACCURACY / FP
MALWARE
MALWARE
MALWARE
MALWARE
MALWARE
MALWARE
PUA
PUA
PUA
PUA
PUA
PUA
0% 0%
0.81 0.00 0.05 4.05 1.42 0.03 1.62 48.94 0.06 12.96 50.35 0.01 14.98 47.52 0.14 12.55 68.79 1.61
0.00 4.96 25.91 1.42 0.81 0.71 4.05 15.60 2.43 26.95 12.96 14.89
99.19 95.04 99.95 69.23 83.69 99.97 97.57 50.35 99.94 83.00 34.04 99.99 82.59 25.53 99.86 74.49 16.31 98.39
October 2019 7
Endpoint Security Buyers Guide
35 35
30 30
25 25
20 20
15 15
10 10
5 5
0 0
1 12 16 16 19 21 22 23 24
1 2 2 1 2 1 2 3
34 19 17 17 15 12 12 10 8
October 2019 8
Endpoint Security Buyers Guide
October 2019 9
Endpoint Security Buyers Guide
AV Comparatives
Intercept X made its first public AV-Comparatives Business Security Test appearance and ranked #1 for
malware detection. We earned a 99.7% detection rate with just one false alarm in the "real world" test,
and 99.9% detection and zero false alarms in the "malware" test.
Seqrite 99.6% 0
Fortinet 98.9% 0
ESET 99.5% 0
PC Magazine
Intercept X received an “Excellent” Rating and their “Editor’s Choice” award.
PC Magazine declared that Intercept X is “an instant win for anyone looking
to provide a defense against ransomware for any sized business.” They went
on to say that it “has a wide range of sophisticated features to guard against
malware of all forms, and has earned the praise of several independent
labs as well as earned our Editors' Choice designation in our ransomware
protection for business review roundup”.
Source: https://www.pcmag.com/review/366727/sophos-intercept-x-
endpoint-protection
AV-Test (Mac)
Sophos scored a 6/6 on protection, 6/6 on performance, and a 6/6 for
usability, the only perfect score among Mac endpoint protection vendors
tested.
Source: https://www.av-test.org/en/antivirus/business-macos/macos-
mojave/june-2019/sophos-endpoint-9.8-191636/
October 2019 10
Endpoint Security Buyers Guide
“Intercept X stopped 100% of the exploit techniques that were missed by the traditional antivirus
application.”3
October 2019 11
Endpoint Security Buyers Guide
NSS Labs
ÌÌ Ranked #1 for Security Effectiveness
ÌÌ Ranked #1 for Total Cost of Ownership (TCO)
AV-Comparatives
ÌÌ Ranked #1 for Malware Protection (99.9% detection, zero false alarms)
MRG Effitas
ÌÌ Ranked #1 for Malware Protection
ÌÌ Ranked #1 for Exploit Protection
ÌÌ 100% block rate, 0 false positives 360 Degree Assessment
PC Magazine
ÌÌ Editor’s Choice
AV-Test
ÌÌ Top Product: 6/6 Protection, 6/6 Usability, 5.6/6 Performance
ÌÌ #1 macOS protection: 6/6 Protection, 6/6 Usability, 6/6 Performance
ÌÌ AV-Test (Android): Perfect Score
Gartner
ÌÌ Leader: 2019 EPP Magic Quadrant
Forrester
ÌÌ Leader: 2018 Endpoint Security Wave
October 2019 12
Endpoint Security Buyers Guide
Ideally, a single vendor provides solutions that work together to give you consistent protection and policy
enforcement throughout your organization. Working with a single vendor can provide better security, reduce
administration, and lower costs.
Some specific technologies to consider along with endpoint protection include full disk encryption,
mobile device management, mobile security, secure email gateway, specialized server or virtual
machine protection, and Synchronized Security between endpoint and network devices.
Intelligent endpoint detection and response means that security teams have the visibility and expertise
they need to answer the tough questions that are asked as part of an incident response effort including:
October 2019 13
Endpoint Security Buyers Guide
1. D
oes the product rely on foundational techniques, modern techniques, or a combination of both?
Which specific features are core to the technology?
2. How does the product detect unknown threats? Does it utilize machine learning?
3. F
or products claiming to leverage machine learning, what type of machine learning is used? Where
does the training data come from? How long has the model been in production?
4. W
hat technology exists to prevent exploit-based and file-less attacks? What anti-exploit techniques
are leveraged, and what types of attacks can they detect?
6. Does the vendor have third party results validating their approach?
7. D
oes the product have an acceptable level of false positives? If a false positive is detected, how easy is
it to reduce its impact?
8. What visibility into an attack does the vendor provide, such as root cause analysis?
9. D
oes the product automatically respond to a threat? Can it automatically clean up a threat and respond
to an incident?
10. What level of effort is involved in the deployment and use of the solution?
Conclusion
As cyber threats continue to grow in both complexity and number it's more important than ever to have
effective protection in place at the endpoint. Understanding the threats you need to block and the different
security technologies available will enable you to make an informed choice of endpoint security, and give
your organization the best protection against today's attacks.
Source:
1 State of Endpoint Security Survey 2018
2 State of Endpoint Security Survey 2018
3 MRG Effitas Comparative Malware Protection Assessment, February 2018
Gartner Magic Quadrant for Endpoint Protection Platforms, Ian McShane, Eric Ouellet, Avivah Litan, Prateek Bhajanka, 24 January 2018 Gartner does not endorse any vendor, product
or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of
the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research,
including any warranties of merchantability or fitness for a particular purpose.
The Forrester Wave™: Endpoint Security Suites, Q4 2016 by Chris Sherman, October 19, 2016
United Kingdom and Worldwide Sales North American Sales Australia and New Zealand Sales Asia Sales
Tel: +44 (0)8447 671131 Toll Free: 1-866-866-2802 Tel: +61 2 9409 9100 Tel: +65 62244168
Email: [email protected] Email: [email protected] Email: [email protected] Email: [email protected]