{"id":7949,"date":"2021-09-28T10:07:39","date_gmt":"2021-09-28T08:07:39","guid":{"rendered":"https:\/\/www.ensec.ch\/it-security-integration\/endpoint-security\/"},"modified":"2025-01-27T16:23:03","modified_gmt":"2025-01-27T15:23:03","slug":"endpoint-security","status":"publish","type":"page","link":"https:\/\/www.ensec.ch\/en\/it-security-integration\/endpoint-security\/","title":{"rendered":"Endpoint Security"},"content":{"rendered":"<h1>Endpoint Security<\/h1>\n<div>\n<p><script src=\"https:\/\/cdn.lordicon.com\/libs\/frhvbuzj\/lord-icon-2.0.2.js\"><\/script> <lord-icon src=\"https:\/\/cdn.lordicon.com\/zpxybbhl.json\" trigger=\"loop\" colors=\"primary:#54BBAB,secondary:#007EA7\" stroke=\"35\" style=\"width: 90px; height: 90px;\"> <\/lord-icon><\/p>\n<\/div>\n<div>\n<h2>Our IT security experts will be happy to advise you.<\/h2>\n<p><a href=\"\/ensec\/kontakt\/\">Call now<\/a><\/p>\n<\/div>\n<hr>\n<h2>\n<p><b>Signature-based antivirus solutions are old hat &#8211; the future belongs to XDR and EDR solutions. <\/b><b>What makes the AV successor EDR better? And what special features do you need to bear in mind when switching to EDR? ensec has the answers for you.<\/b><\/p>\n<\/h2>\n<div>Our IT security integration for your business<\/div>\n<ul>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/network-security\/\">Network Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/content-security\/\">Content Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/application-security\/\">Application Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/cloud-security\/\">Cloud Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/infrastructure-security\/\">Infrastructure Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/ot-security\/\">OT Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\">Endpoint Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/security-analytics\/\">Security Analytics<\/a>\n    <\/li>\n<\/ul>\n<hr>\n<h2>\n<p><b>Endpoint security: how to protect servers and end devices today<\/b><\/p>\n<\/h2>\n<div>\n<p>What is the difference between EDR (Endpoint Detection &amp; Response) and traditional antivirus (AV) software? While AV detects malware, blocks it and then sounds the alarm, modern EDR solutions also provide detailed reports on the attack history, IoC (Indicator of Compromise) and an assessment of criticality.<\/p>\n<p>The AV successors therefore show processes &#8211; downloading an email attachment via Microsoft Outlook, saving the file by users, opening the file in Microsoft Excel, executing a macro, reloading malware &#8211; in full and in context. This makes security incidents much easier to read, the tool directly supports the processes of the Security Operation Centre and relieves the burden on employees. Further details on <a href=\"https:\/\/www.ensec.ch\/en\/edr-und-xdr-die-weiterentwicklung-der-endpoint-security\/\">EDR solutions can be found in our specialist article<\/a> on the topic.<\/p>\n<\/div>\n<div>\n<p>It is also important to understand that the definition of &#8220;endpoint&#8221; in the case of EDR is broad. In addition to classic Windows and Mac clients, EDR software also covers Windows and Linux servers. This list already points to one of the challenges when introducing EDR &#8211; in addition to the security specialists in the company, those responsible for the client and server infrastructure must also be at the table. The migration from AV to EDR cannot be accomplished without cross-team collaboration.<\/p>\n<\/p>\n<p>And this is exactly where ensec comes into play: We have the expertise to help you integrate the necessary processes. Typically, our customers&#8217; security experts later operate their EDR environments themselves. During the initial integration, however, we are at your side right from the start. In addition to providing support with the actual implementation and configuration, we are also happy to take on the role of project manager. Here we bring all the relevant specialist departments &#8211; clients, servers, security, legal, change management, SoC &#8211; on board and ensure that the necessary processes are established.<\/p>\n<\/div>\n<h3>\n<h3>How does the EDR world get started?<\/h3>\n<\/h3>\n<div>\n<p>The actual introduction of EDR software is technically less complex than is the case with antivirus solutions: After installation, the agents on the endpoints connect to the management server operated in the cloud or on-prem and can be controlled centrally from there.<\/p>\n<p>Before the software is activated, a baseline is created. This means recording normal operation in order to avoid false-positive alarms later on. ensec takes on this task for you &#8211; we monitor a number of endpoints agreed with you and check each message to see whether it was false-positive. We advise you on the point at which the solution switches from pure detection to response mode.<\/p>\n<p>In addition, our experts will help your security teams to correctly interpret the messages generated by the software. Our services also include training for operational and application managers.<\/p>\n<p>Once the Endpoint Detection &amp; Response solution is up and running, our <a href=\"https:\/\/www.ensec.ch\/en\/ensec-support\/\">support services<\/a> will be at your side in the future. Would you like a service level that goes beyond reactive support? Then let&#8217;s talk about a <a href=\"https:\/\/www.ensec.ch\/en\/managed-it-security\/\">managed service offer<\/a>.<\/p>\n<\/div>\n<h3>\n<h3>XDR<\/h3>\n<\/h3>\n<div>\n<p>While EDR is limited to what happens on the endpoints, XDR solutions expand this view to include information from network elements or cloud applications. In the event of an incident, all of this information is correlated to form a big picture, providing a clearer picture of the attack vector. This makes the work of SOC specialists, for example, much easier.<\/p>\n<\/div>\n<h2>Endpoint Security in Detail<\/h2>\n<ul>\n<li>\n<h3>EDR<\/h3>\n<div>\n<p>Flexible working, independent of location and not always in connection with the company network. This requires protection not only at the perimeter but also directly at the endpoint. Intelligent mechanisms recognise and report attacks within milliseconds.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>XDR<\/h3>\n<div>\n<p>Extended Detection and Response links the endpoints with network elements and cloud applications with the aim of further correlating and automating the analyses. In other words, an extension of EDR.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Mobile Security<\/h3>\n<div>\n<p>Mobile devices enable easy access to cloud services such as Microsoft 365 etc. Business data and resources must also be protected there. This can be ensured with a mobile security container, for example, which creates a protected company area on personal devices.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/11\/it-security_07.jpg\" alt=\"\"><\/p>\n<h2>EDR reduces your operating costs in several areas.<\/h2>\n<p>From a business perspective<\/p>\n<div>\n<p><b>Compared to antivirus solutions, EDR systems are cheaper to operate. They do not require extensive maintenance, do not require attention in terms of signature downloads and, thanks to context-based reports, shorten troubleshooting if, contrary to expectations, an infection occurs.<\/b><\/p>\n<p>These reports not only save internal man-hours. They often also answer the question of whether external forensics experts should be hired. Or whether internal specialists can accurately identify the infected components and possible data leaks on their own thanks to the better situational awareness compared to antivirus solutions.<\/p>\n<p>And even in the context of a data breach, time is money. EDR software allows you to identify the breach faster and more accurately. This time advantage can make a decisive contribution to minimising the financial losses caused by the data breach.<\/p>\n<\/div>\n<\/div>\n<h2>\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\/p>\n<\/h2>\n<p><p>\n        <a href=\"mailto:hello@ensec.ch\">Write to us<\/a>\n    <\/p>\n<\/p>\n<div>\n<p>Or give us a call:<\/p>\n<\/div>\n<h3><a href=\"tel:+41447111144 \">+41 44 711 11 44<\/a><\/h3>\n<p><!--more--><br \/>\n<!-- {\"name\":\"Home\",\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"120\",\"css\":\".el-section {\\n\\tbackground-image: url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ensec-hintergrund_animation.svg'), url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/background_seamap-03.png');\\n  background-repeat: no-repeat, no-repeat;\\n  background-position: center, center;\\n  background-size: cover, cover;\\n}\",\"header_transparent_noplaceholder\":true,\"id\":\"top\",\"image_position\":\"top-center\",\"image_size\":\"cover\",\"media_background\":\"#007EA7\",\"media_overlay\":\"rgba(0, 0, 0, 0.1)\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"style\":\"muted\",\"text_color\":\"light\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"video_width\":\"2560\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"2-3,1-3\",\"margin\":\"remove-vertical\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Endpoint Security\",\"margin\":\"small\",\"margin_remove_top\":true,\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"s\",\"text_align_fallback\":\"center\",\"title_color\":\"success\",\"title_element\":\"h1\",\"title_style\":\"heading-large\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"text\",\"props\":{\"block_align\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p><script src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/libs\\\/frhvbuzj\\\/lord-icon-2.0.2.js\\\"><\\\/script> <lord-icon src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/zpxybbhl.json\\\" trigger=\\\"loop\\\" colors=\\\"primary:#54BBAB,secondary:#007EA7\\\" stroke=\\\"35\\\" style=\\\"width: 90px; height: 90px;\\\"> <\\\/lord-icon><\\\/p>\",\"css\":\".el-element {\\n\\twidth: 120px;\\n    padding: 15px;\\n    border-radius: 50%;\\n    background-color:#fff;\\n    box-shadow: rgba(50, 50, 93, 0.25) 0px 50px 100px -20px, rgba(0, 0, 0, 0.3) 0px 30px 60px -30px;\\n}\",\"margin\":\"default\",\"margin_remove_top\":false,\"maxwidth\":\"medium\",\"position\":\"relative\",\"position_top\":\"55\",\"position_z_index\":\"1\",\"text_align\":\"center\"}},{\"type\":\"grid\",\"props\":{\"animation\":\"fade\",\"content_column_breakpoint\":\"m\",\"css\":\".el-title {\\n\\tpadding-top:10px;\\n}\\n\\n.el-item > * {\\n\\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.16) 0px 10px 36px 0px, rgba(0, 0, 0, 0.06) 0px 0px 0px 1px;\\n}\\n\\n.el-item > *:hover {\\n    box-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\\n\\n.el-item > *:hover .el-link { \\n\\tbackground-color: #003249;\\n\\tborder: solid 1px #003249;\\n\\tcolor: #fff;\\n\\tbox-shadow: rgba(0, 0, 0, 0.25) 0px 54px 55px, rgba(0, 0, 0, 0.12) 0px -12px 30px, rgba(0, 0, 0, 0.12) 0px 4px 6px, rgba(0, 0, 0, 0.17) 0px 12px 13px, rgba(0, 0, 0, 0.09) 0px -3px 5px;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":true,\"grid_default\":\"1\",\"grid_medium\":\"\",\"grid_row_align\":false,\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":false,\"image_svg_color\":\"emphasis\",\"image_svg_inline\":true,\"image_width\":\"80\",\"item_animation\":true,\"item_maxwidth\":\"large\",\"lightbox_bg_close\":true,\"link_margin\":\"medium\",\"link_style\":\"primary\",\"link_text\":\"Read More\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"parallax_easing\":\"1\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"text_align\":\"center\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"\",\"link\":\"kontakt\\\/\",\"link_text\":\"Call now\",\"title\":\"Our IT security experts will be happy to advise you.\"}}]}]}]}],\"name\":\"Hero \\u2013\\u00a0Level 2 \\\/\\\/ CTA - animiert\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"150\",\"css\":\".el-section {\\n\\tpadding-bottom:60px;\\n}\",\"id\":\"pricelist\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"breadcrumbs\",\"props\":{\"show_current\":true,\"show_home\":true}},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"margin\":\"medium\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}],\"props\":{\"layout\":\"3-4,1-4\"}},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"medium\",\"margin_remove_bottom\":true,\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<p><b>Signature-based antivirus solutions are old hat - the future belongs to XDR and EDR solutions. <\\\/b><b>What makes the AV successor EDR better? And what special features do you need to bear in mind when switching to EDR? ensec has the answers for you.<\\\/b><\\\/p>\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"large\",\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Our IT security integration for your business\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"div\",\"title_style\":\"h5\"}},{\"type\":\"subnav\",\"props\":{\"css\":\"@media only screen and (max-width: 600px) {\\n  a.el-content, a.el-link {\\n  padding:10px 20px;\\n  }\\n}\\n\\n.el-link {\\n  padding: 20px 40px;\\n  border: solid 1px #007ea7;\\n  background-color: #fff;\\n  color: #007ea7;\\n}\\n\\n.el-link:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\\n\\n.el-content {\\n  padding: 20px 40px;\\n  border: solid 1px #007ea7;\\n  background-color: #007ea7;\\n  color: #fff;\\n}\",\"subnav_style\":\"pill\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Network Security\",\"link\":\"en\\\/it-security-integration\\\/network-security\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Content Security\",\"link\":\"en\\\/it-security-integration\\\/content-security\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Application Security\",\"link\":\"en\\\/it-security-integration\\\/application-security\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Cloud Security\",\"link\":\"en\\\/it-security-integration\\\/cloud-security\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Infrastructure Security\",\"link\":\"en\\\/it-security-integration\\\/infrastructure-security\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"OT Security\",\"link\":\"en\\\/it-security-integration\\\/ot-security\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Endpoint Security\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Security Analytics\",\"link\":\"en\\\/it-security-integration\\\/security-analytics\\\/\"}}],\"modified\":\"2021-05-11T13:39:40.496Z\",\"name\":\"Subnav \\u2013 IT Security\"},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"margin\":\"medium\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"remove-vertical\",\"margin_remove_top\":true},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<p><b>Endpoint security: how to protect servers and end devices today<\\\/b><\\\/p>\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h2\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>What is the difference between EDR (Endpoint Detection &amp; Response) and traditional antivirus (AV) software? While AV detects malware, blocks it and then sounds the alarm, modern EDR solutions also provide detailed reports on the attack history, IoC (Indicator of Compromise) and an assessment of criticality.<\\\/p>\\n\n\n<p>The AV successors therefore show processes - downloading an email attachment via Microsoft Outlook, saving the file by users, opening the file in Microsoft Excel, executing a macro, reloading malware - in full and in context. This makes security incidents much easier to read, the tool directly supports the processes of the Security Operation Centre and relieves the burden on employees. Further details on <a href=\\\"https:\\\/\\\/www.ensec.ch\\\/en\\\/edr-und-xdr-die-weiterentwicklung-der-endpoint-security\\\/\\\">EDR solutions can be found in our specialist article<\\\/a> on the topic.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\",\"text_color\":\"primary\",\"text_style\":\"large\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"medium\",\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>It is also important to understand that the definition of \\\"endpoint\\\" in the case of EDR is broad. In addition to classic Windows and Mac clients, EDR software also covers Windows and Linux servers. This list already points to one of the challenges when introducing EDR - in addition to the security specialists in the company, those responsible for the client and server infrastructure must also be at the table. The migration from AV to EDR cannot be accomplished without cross-team collaboration.<\\\/p>\\n\n\n<p><\\\/p>\\n\n\n<p>And this is exactly where ensec comes into play: We have the expertise to help you integrate the necessary processes. Typically, our customers' security experts later operate their EDR environments themselves. During the initial integration, however, we are at your side right from the start. In addition to providing support with the actual implementation and configuration, we are also happy to take on the role of project manager. Here we bring all the relevant specialist departments - clients, servers, security, legal, change management, SoC - on board and ensure that the necessary processes are established.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}},{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<h3>How does the EDR world get started?<\\\/h3>\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>The actual introduction of EDR software is technically less complex than is the case with antivirus solutions: After installation, the agents on the endpoints connect to the management server operated in the cloud or on-prem and can be controlled centrally from there.<\\\/p>\\n\n\n<p>Before the software is activated, a baseline is created. This means recording normal operation in order to avoid false-positive alarms later on. ensec takes on this task for you - we monitor a number of endpoints agreed with you and check each message to see whether it was false-positive. We advise you on the point at which the solution switches from pure detection to response mode.<\\\/p>\\n\n\n<p>In addition, our experts will help your security teams to correctly interpret the messages generated by the software. Our services also include training for operational and application managers.<\\\/p>\\n\n\n<p>Once the Endpoint Detection &amp; Response solution is up and running, our <a href=\\\"https:\\\/\\\/www.ensec.ch\\\/en\\\/ensec-support\\\/\\\">support services<\\\/a> will be at your side in the future. Would you like a service level that goes beyond reactive support? Then let's talk about a <a href=\\\"https:\\\/\\\/www.ensec.ch\\\/en\\\/managed-it-security\\\/\\\">managed service offer<\\\/a>.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}},{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<h3>XDR<\\\/h3>\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>While EDR is limited to what happens on the endpoints, XDR solutions expand this view to include information from network elements or cloud applications. In the event of an incident, all of this information is correlated to form a big picture, providing a clearer picture of the attack vector. This makes the work of SOC specialists, for example, much easier.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]}],\"name\":\"Content \\u2013 Level 2\",\"modified\":\"2021-05-11T13:23:47.505Z\"},{\"name\":\"Services Titel\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"id\":\"services\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"padding\":\"small\",\"padding_remove_bottom\":false,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Endpoint Security in Detail\",\"title_element\":\"h2\",\"title_style\":\"h1\"}}]}],\"props\":{\"width\":\"expand\"}}]},{\"name\":\"Services\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"id\":\"services\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-05.svg\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"padding\":\"large\",\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-1\"},\"children\":[{\"type\":\"grid\",\"props\":{\"animation\":\"none\",\"content_column_breakpoint\":\"m\",\"css\":\".el-item:hover {\\n\\tbox-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\\n\\n.el-item {\\n\\tcolor:#151515;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_large\":\"4\",\"grid_medium\":\"\",\"grid_parallax\":\"0\",\"grid_small\":\"2\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"item_animation\":true,\"item_maxwidth\":\"xlarge\",\"lightbox_bg_close\":true,\"link_style\":\"text\",\"link_text\":\"Mehr erfahren\",\"margin\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"0,-80\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h2\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Flexible working, independent of location and not always in connection with the company network. This requires protection not only at the perimeter but also directly at the endpoint. Intelligent mechanisms recognise and report attacks within milliseconds.<\\\/p>\",\"image\":\"\",\"title\":\"EDR\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Extended Detection and Response links the endpoints with network elements and cloud applications with the aim of further correlating and automating the analyses. In other words, an extension of EDR.<\\\/p>\",\"image\":\"\",\"title\":\"XDR\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Mobile devices enable easy access to cloud services such as Microsoft 365 etc. Business data and resources must also be protected there. This can be ensured with a mobile security container, for example, which creates a protected company area on personal devices.<\\\/p>\",\"image\":\"\",\"title\":\"Mobile Security\"}}]}]}],\"props\":{\"width\":\"expand\"}}]},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"150\",\"css\":\".el-section {\\n\\tpadding-bottom:60px;\\n}\",\"id\":\"pricelist\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"top-center\",\"image_size\":\"contain\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"animation\":\"none\",\"content\":\"\n\n<p><b>Compared to antivirus solutions, EDR systems are cheaper to operate. They do not require extensive maintenance, do not require attention in terms of signature downloads and, thanks to context-based reports, shorten troubleshooting if, contrary to expectations, an infection occurs.<\\\/b><\\\/p>\\n\n\n<p>These reports not only save internal man-hours. They often also answer the question of whether external forensics experts should be hired. Or whether internal specialists can accurately identify the infected components and possible data leaks on their own thanks to the better situational awareness compared to antivirus solutions.<\\\/p>\\n\n\n<p>And even in the context of a data breach, time is money. EDR software allows you to identify the breach faster and more accurately. This time advantage can make a decisive contribution to minimising the financial losses caused by the data breach.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"content_margin\":\"medium\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2021\\\/11\\\/it-security_07.jpg\",\"image_align\":\"right\",\"image_grid_breakpoint\":\"m\",\"image_grid_column_gap\":\"large\",\"image_grid_width\":\"3-5\",\"image_height\":\"780\",\"image_link\":true,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"image_width\":\"910\",\"link_style\":\"text\",\"link_text\":\"\",\"margin\":\"large\",\"margin_remove_top\":false,\"meta\":\"From a business perspective\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"h4\",\"panel_padding\":\"large\",\"panel_style\":\"card-primary\",\"parallax_breakpoint\":\"l\",\"parallax_x\":\"220,0\",\"title\":\"EDR reduces your operating costs in several areas.\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_link\":false,\"title_margin\":\"small\",\"title_style\":\"h2\"}}]}]}],\"name\":\"Aus Sicht des Business \\u2013 schmal\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-top: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 0 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n\\tborder-right: 0px solid #fff;\\n    padding: 0 0 0 50px;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"large\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_breakpoint\":\"m\",\"block_align_fallback\":\"center\",\"content\":\"\n\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\\\/p>\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-left: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 50px 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n \\tborder-left: 0px solid #fff;\\n    padding: 0 50px 0 0;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"none\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"button\",\"props\":{\"button_size\":\"large\",\"css\":\".el-content {\\n\\tfont-size: 1.3rem;\\n    padding: 15px 40px;\\n    text-transform: uppercase;\\n}\\n\\n.el-content:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"text_align\":\"center\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"primary\",\"content\":\"Write to us\",\"dialog_layout\":\"modal\",\"dialog_offcanvas_flip\":true,\"icon_align\":\"left\",\"link\":\"mailto:hello@ensec.ch\"}}]},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Or give us a call:<\\\/p>\",\"margin\":\"default\",\"margin_remove_bottom\":true,\"text_align\":\"center\"}},{\"type\":\"headline\",\"props\":{\"content\":\"+41 44 711 11 44\",\"link\":\"tel:+41447111144 \",\"margin_remove_top\":true,\"text_align\":\"center\",\"title_element\":\"h3\"}}]}],\"props\":{\"column_gap\":\"collapse\",\"layout\":\"2-3,1-3\",\"row_gap\":\"collapse\"}}],\"name\":\"Call to Action\",\"modified\":\"2021-02-09T15:59:25.850Z\"}],\"version\":\"4.5.1\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Endpoint Security Our IT security experts will be happy to advise you. Call now Signature-based antivirus solutions are old hat &#8211; the future belongs to XDR and EDR solutions. What makes the AV successor EDR better? And what special features do you need to bear in mind when switching to EDR? ensec has the answers [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":7911,"menu_order":6,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7949","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/comments?post=7949"}],"version-history":[{"count":6,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7949\/revisions"}],"predecessor-version":[{"id":8284,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7949\/revisions\/8284"}],"up":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7911"}],"wp:attachment":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/media?parent=7949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}