All Research
Executive View
Enterprise Inspector is ESET’s Endpoint Detection & Response (EDR) solution. It currently runs on Windows and MacOS. ESET Enterprise Inspector collects and analyzes information to help security analysts determine if malicious activities have occurred. The solution also allows for pre-configured remediation actions to be executed when certain conditions are met.

1 Introduction

Endpoint Detection & Response (EDR) solutions have become increasingly popular in just the last few years as a means to help security analysts determine if other security mechanisms have failed, if their systems have been attacked and compromised, and if valuable data has been exfiltrated. Surveys show that 11% of cybersecurity breaches are targeted attacks, and 13% are acts of corporate espionage, designed to steal state or trade secrets. Malware and account takeovers are involved in 48% and 14% of attacks respectively. Almost every industry and every level of government agency are under attack. Organizations are justified in looking for additional security tools to discover and thwart such attempts. A main goal of EDR is often reducing the Mean Time To Respond (MTTR), given that many reports show that attackers can spend months inside organizations before being detected.

EDR solutions look for evidence and effects of malware or other malicious activities that may have slipped past Endpoint Protection (EPP) products and other security tools, such as email/web gateways. Security professionals refer to such data points as Indicators of Compromise (IOCs). Examples of IOC types include:

  • MD5 file hashes
  • Known bad IPs and URLs
  • File/process name mismatches
  • Unusual application and network port usage
  • Unusual process injections
  • Module load point modifications
  • Registry changes

EDR solutions log activities centrally, allow administrators to examine endpoints remotely, and generate reports often complete with attribution theories and confidence levels. Key features of endpoint protection products include:

  • Host-based agents for detecting malware infection, command and control (C2) traffic, reconnaissance and lateral movement of bad actors, and data exfiltration attempts. Additionally, as part of the detection process, EDR tools can also perform evaluation of threat intelligence information, event correlation, interactive querying, live memory analysis, and activity recording and playback. Using Machine Learning (ML) and Deep Learning (DL) algorithms can help produce normal baselines and reduce false positives.
  • Management console for collecting and analyzing information from deployed agents, producing alerts, and facilitating incident response, threat hunting, and forensic investigations.
  • Automatic responses can be configured on consoles and executed by agents. Responses can include actions such as termination of processes, file removal, quarantine, memory analysis, forensic evidence collection, and full endpoint restoration.
  • Interface to Security Intelligence systems such as SIEM.

EDR solutions can provide additional insights into possible nefarious activities in your enterprise and can serve as a complement to other security tools. EDR is not a substitute for EPP, but rather a component of many modern security architectures, alongside EPP, email/web gateways, Network Threat Detection & Response (NTDR), and even Distributed Threat Deception tools.

EDR solutions require a special set of skills to not only implement and run but also from which to derive value. The inclusion of ML technology does not obviate the need for trained security analysts. Most organizations that successfully deploy EDR have a well-defined IT security organization and one or more SOCs (Security Operations Centers), staffed by knowledgeable security analysts. Such organizations would be categorized as at least Level 1 or 2 in the Hunting Maturity Model.

ESET is headquartered in Bratislava, Slovakia, with many offices and customers around the globe. The company formed more than 30 years ago, and currently serves 110 million users in 200 countries. ESET also publishes industry-leading cybersecurity research and was the first anti-malware vendor to discover LoJax and remediate UEFI malware in 2016. The company has won many awards from independent testers over the years.

Full article is available for registered users with free trial access or paid subscription.
Log in
Register and read on!
Create an account and buy Professional package, to access this and 600+ other in-depth and up-to-date insights
Register your account to start 30 days of free trial access
Register
Get premium access
Choose a package

Stay up to date

Subscribe for a newsletter to receive updates on newest events, insights and research.
I have read and agree to the Privacy Policy
I have read and agree to the Terms of Use