The Evolution of Endpoint Security Demands Detection and Response

The Evolution of Endpoint Security Demands Detection and Response

Legacy endpoint prevention and protection solutions are limited when faced with advanced and sophisticated threats

With more than 832 million malware samples roaming the internet, organizations are at constant risk of being targeted and affected. While the sheer number of threats is something to be wary of, malware complexity and stealth has also increased exponentially over the past couple of years.

Security experts agree, 99 percent of all malware can be spotted by endpoint security solutions and technologies, and it’s usually the last 1 percent making headlines as being responsible for data breaches, data exfiltration, and covert cyber espionage operations.

What Endpoint Security Does

Traditional endpoint security solutions are designed to ensure multi-layered protection against garden-variety threats, malware, and fraudulent websites that might extort both the user’s privacy and data. From a technology point of view, this involves monitoring processes to ascertain when applications start behaving badly or when they’re trying to inject into other processes.

For example, some malware tries to inject code into legitimate processes, such as explorer.exe, to execute malicious code with the privileges of that process. Since this is a malicious attempt, a security solution will immediately terminate this action and potentially revert any changes committed by the malicious process on the legitimate one.

When monitoring processes, endpoint security solutions typically provide a score for each process based on an assessment of whether each action performed is malicious or harmless. If the sum total of some actions performed by the same process exceeds a certain threshold, the application will be terminated and all performed actions will be severed. While this is just one example of process-monitoring security technology that constantly monitors the behavior of running applications, modern endpoint security solutions can also be relied on to go one step further and employ several layers of security that are usually augmented by machine learning algorithms.

What Endpoint Security Doesn’t Address

The reality is that while most security technologies are great at defending endpoints against malware and software-based threats, they are often limited when faced with advanced and sophisticated threats (APTs) that are specifically targeted at an individual organization or an employee of that organization.

Advanced and persistent malware is commonly built to evade detection by traditional security solutions. Cybercriminals generally perform a long surveillance program of their victims in order to find out everything they can about the victim’s network configuration, policies, security access, and even internally deployed security solutions. With this insight in hand, attackers can readily develop a threat or piece of malware that’s specifically created for that target, sporting sufficient infiltration and evasion capabilities that fly below the radar of traditional security solutions.

Traditional endpoint solutions also struggle with fileless malware attacks. This is because instead of installing software on a victim’s machine, fileless attacks hijack tools built into Windows to infiltrate a network or system—in short, turning the OS on itself. Consider for example, PowerShell scripts. They are usually legitimate processes to allow IT admins to automate tasks on endpoints. However, they are also abused by threat actors because they use a native Windows tool.

While fileless malware has been typically associated with state-sponsored actors, the low barrier to entry makes it extremely easy for threat actors to use it to deploy seemingly benign payloads, such as cryptocurrency miners. In fact, the Bitdefender Global Mid-Year Cybersecurity Landscape Report shows that fileless malware has been significantly used in conjunction with ransomware and cryptocurrency miners, because it offers a stealth alternative to deploying financially profitable malware.

Fileless malware, combined with the advent of the use of zero-day vulnerabilities in popular software and applications, enables threat actors to fly under the radar of traditional endpoint security. These methods allow attackers to plant various threats, malware, and persistency tools designed to increase their foothold on the compromised device. In a growing and unnerving trend, they also move laterally across the entire IT infrastructure.

Visibility is Key for Detection and Response

While endpoint security is not equipped to detect if user credentials are being misused by threat actors to log into the infrastructure, EDR tools will immediately flag these actions – credentials misuse and data exfiltration – as they demonstrate signs of abnormal behavior that are usually attributed to threat actors and potential data breaches. For example, because of phishing, employees may reveal their credentials, enabling threat actors to breach the infrastructure without deploying malware or any type of advanced threats. From that point onward, attackers can access and copy internal documents and data, and even install additional persistency tools that enable them with full control over the targeted endpoint. Since the EDR solutions are capable of monitoring and logging any action performed on endpoints – while the security solution is only focused on detecting malware – it’s capable of flagging user logins during off hours and report them to IT and security teams for investigation.

While advanced threats are characterized by stealth; it does not mean they are completely invisible. Their actions leave behind traces that although traditional endpoint security solutions don’t tag as suspicious, endpoint detection and response (EDR) tools will automatically detect them and issue warnings to IT and security teams.

EDR is also a powerful post-investigation tool for when companies experience a data breach and are required by law to perform timely reports on how the breach occurred. EDR can help IT and security teams follow the chain of events back in time, to the original infection vector that led to the data breach, and eventually plug it by monitoring and logging security events happening on endpoints. Everything from user logins to software updates to executed files are logged and reported in the centralized management console so that the IT and security team can have a complete picture of actions performed by end users.

Next Generation EDR

While the power of EDR is visibility, without prioritization of incidents, it can become a burden if every security warning is treated as a potential security breach. The effectiveness of EDR is lost if IT and security teams are constantly checking security alerts without having the ability to perform triage to determine what’s critical. Moreover, the risk becomes “alert fatigue,” where staffs are so overwhelmed by the volume of alerts that they limit their focus to just address what’s perceived as the biggest problems. What appears to be smaller issues could in fact be something that is easily addressed and stops the potential spread of growing threats.

For the forward-thinking enterprise, the key is to leverage both EDR and endpoint prevention and protection. However, from an IT and security perspective, while both solutions are designed to secure workloads and spot potential security anomalies, they’re disparate in terms of management and visibility. This means that having both installed on an endpoint will also cause what the industry refers to as “agent fatigue.” The more disparate agents present on an endpoint, the bigger the performance impact on the machine and the bigger the management effort for the IT and security teams.

Next generation EDR marries endpoint prevention and detection and response. These EDR solutions also have the ability to perform triage on security events. Machine learning is a key component in achieving this as it can be trained to only warn security and IT teams when potentially dangerous security events are detected. Organizations with complex infrastructures must look to deploy an integrated platform that addresses both active security incidents and potential security incidents, IT and security teams can save time and ensure a complete overview of the security posture of the organization’s infrastructure.

Featured

  • Collaboration Made Easy Using a Work Management Platform

    Effective collaboration between security operators, teams and other departments is critical to the smooth functioning of organizations. Yet, as organizations grow in complexity, it becomes more difficult for teams to coordinate with each other. This is compounded by staffing shortages, turnover and ineffective collaboration tools. Read Now

  • Creating a Safer World

    Managing and supporting locks and door hardware within a facility is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Read Now

  • Creating More Versatility

    Today, AI has become top of mind for most security professionals. It is the topic of conversation in the technology world and continues to transform the way data is used to make important business decisions. Read Now

  • Report: 78 Percent of CISOs Seeing Significant Impact from AI-Powered Cyber Threats

    Darktrace recently unveiled its 2025 State of AI Cybersecurity report. The findings reveal that 78% of Chief Information Security Officers (CISOs) surveyed say that AI-powered threats are having a significant impact on their organizations, a 5% increase1 from 2024. While an increasing number of CISOs report feeling a significant impact from AI threats, more than 60% now say that they are adequately prepared to defend against these threats, an increase of nearly 15% year-over-year. However, insufficient AI knowledge and skills and a shortage of personnel and talent continue to be listed as the two top inhibitors to a successful defense. Read Now

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.