Endpoint Detection & Response

Endpoint Detection & Response (EDR) – reliable protection for devices

70 percent of all successful cyber attacks start on a device (endpoint). Preventative protective measures, such as anti-virus software, are therefore not enough on their own. However, Endpoint Detection & Response is able to detect typical anomalies and protect devices, even from sophisticated attacks.

Improved and extended endpoint security

Due to anomalies in network traffic, EDR can identify sophisticated attacks such as fileless or zero-day attacks. Relevant security incidents on workplace computers, smartphones, tablets, servers and IoT devices are incorporated into a single central dashboard. Security officers are immediately informed about the attack and can ideally respond before the attacker infiltrates the network further. EDR can automatically take the initial defensive measures, such as quarantining a suspicious file, reducing the workload for the security and IT departments.



Your benefits

Protects devices from complex attacks using behaviour-based analysis

Reduces the security team’s workload thanks to automated analysis and defence

End-to-end overview of endpoint security incidents

When is it the right solution?

Devices in companies are the primary target of cybercriminal attacks. As many recent successful attacks have shown, preventative protective measures such as anti-virus and firewalls are no longer sufficient. You therefore have to take additional measures to reliably detect and respond to attacks.

Varying device configurations hamper protection and provide cybercriminals with a wide range of potential targets. In addition, with the increasing trend towards employees working outside the corporate network, security departments or the Security Operation Center (SOC) often lack an inside view of the devices to detect attacks. You therefore require a system capable of analysing behaviour, evaluating suspicious incidents and reporting them to a central hub.

What’s in it for you:

  • Comprehensive protection for all devices
  • Automatic analysis and protection from threats
  • Central dashboard with overview of relevant events

Why Swisscom?

  • Expertise: we protect you with policies and regulations that are constantly updated.
  • Integration: by being integrated into our SOC, you minimise your security risk.
  • Managed service: you benefit from our proven, in-depth endpoint security expertise.

The first step

contact-icon

Request quotation

Would you like to find out more about our EDR solution? We look forward to preparing your no-obligation quotation.

Downloads

Factsheet: Endpoint Detection & Response (EDR)

Whitepaper: Detecting and protecting against complex endpoint attacks

Article

Devices – the cybercriminal’s favourite point of entry

How does Endpoint Detection & Response (EDR) work?

Unusual activity on endpoints is reported to and analysed by the EDR cloud service. If a security incident is detected, an alert is generated which can automatically trigger protective measures. These appear in the dashboard and can be seen and responded to by the security officers.

How does Endpoint Detection & Response (EDR) work?

Application examples

How Endpoint Detection & Response supports your security requirements.

Real-time overview

The customer requirement

You want a constant overview of the activities on your devices to enable an immediate response to security incidents.

Our solution

The EDR dashboard gives you a real-time, at-a-glance overview of what is happening on your endpoints.

Protection against sophisticated cyber attacks

Protection beyond the corporate network

A lack of resources to operate EDR

Still have questions? Our security experts will be happy to advise you.