{"id":16921,"date":"2019-11-18T13:00:01","date_gmt":"2019-11-18T21:00:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/11\/18\/news-10658\/"},"modified":"2019-11-18T13:00:01","modified_gmt":"2019-11-18T21:00:01","slug":"news-10658","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/11\/18\/news-10658\/","title":{"rendered":"3 Reasons MSPs Must Evolve Beyond Endpoint Detection and Response"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Mon, 18 Nov 2019 19:48:17 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/07\/XDR-blog-1-300x169.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/07\/XDR-blog-1-300x169.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/07\/XDR-blog-1-768x432.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/07\/XDR-blog-1-640x360.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/07\/XDR-blog-1-440x248.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/07\/XDR-blog-1-380x214.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/07\/XDR-blog-1.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Endpoint protection is a critical component of a security strategy. But it\u2019s not enough.<\/p>\n<p>Today\u2019s threat landscape is so wide and varied, it requires round-the-clock monitoring, full visibility into IT environments and a multilayered approach to keep hackers at bay. For MSPs, this creates a sizable opportunity to protect clients with a comprehensive security strategy that goes beyond endpoint detection and response.<\/p>\n<p>But most MSPs are still too focused on endpoint detection and response, which can leave parts of the network unprotected. A lot of threats today are stealthy, disguising themselves and hiding until the right time to strike, and traditional environments aren\u2019t set up to stop such threats because they\u2019re often split into silos containing applications that perform specific tasks. The silos don\u2019t communicate with each other, making it impossible to assemble a contextual view of threats and slowing down investigation and response.<\/p>\n<p>MSPs can improve their clients\u2019 security posture with a unified security approach that includes central visibility and monitoring, the ability to investigate threats that at first may appear harmless, and fast response capabilities. Here are three compelling reasons to deliver detection and response beyond the endpoint:<\/p>\n<p><strong>1. New threats demand new approaches<\/strong><br \/> Security breaches have increased 67 percent in the past five years, growing 11 percent in the last year alone, according to Accenture. Yet two thirds of organizations say they have multiple security tools, which limits their effectiveness to detect and respond to threats.<\/p>\n<p>Companies need technology that detects trouble at all levels of the network, uses machine learning to sift through massive volumes of threat data and identify previously undetected threats, and promptly responds to an attack by isolating threats and mitigating the risk of infection.<\/p>\n<p><strong>2. Slow response worsens attacks<\/strong><br \/> The longer it takes to detect an attack, the higher its impact. Many malware variants work stealthily for months, spreading infection, stealing data and sending it out to a command and control server long before they are detected and stopped.<\/p>\n<p>Without the tools to identify threat indicators, detection is slow and ineffective. Verizon estimates that a solid majority of breaches \u2014 68 percent \u2014 take 197 days to discover. That\u2019s six and a half months! By then, a lot of damage can be done, potentially compromising private employee, customer and partner data, as well as intellectual property.<\/p>\n<p><strong>3. In-house resources are scarce<\/strong><br \/> Perversely, as the threat landscape gets more dangerous, it\u2019s harder for businesses to obtain the necessary skill to combat threats. Cybersecurity professionals are scarce and expensive, which is why MSPs need to step in with managed security solutions to protect their clients\u2019 environments.<\/p>\n<p>Trend Micro helps MSPs accomplish this feat with Worry-Free XDR, which offers detection and response beyond the endpoint \u2013 correlating data automatically across email and endpoint in one console. The solution provides full visibility into customer\u2019s environments, ensuring MSPs can move beyond the endpoint to offer clients the protection that today\u2019s digital world demands.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/3-reasons-msps-must-evolve-beyond-endpoint-detection-and-response\/\">3 Reasons MSPs Must Evolve Beyond Endpoint Detection and Response<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/3-reasons-msps-must-evolve-beyond-endpoint-detection-and-response\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Mon, 18 Nov 2019 19:48:17 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/07\/XDR-blog-1-300x169.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/07\/XDR-blog-1-300x169.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/07\/XDR-blog-1-768x432.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/07\/XDR-blog-1-640x360.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/07\/XDR-blog-1-440x248.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/07\/XDR-blog-1-380x214.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/07\/XDR-blog-1.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Endpoint protection is a critical component of a security strategy. But it\u2019s not enough. Today\u2019s threat landscape is so wide and varied, it requires round-the-clock monitoring, full visibility into IT environments and a multilayered approach to keep hackers at bay. For MSPs, this creates a sizable opportunity to protect clients with a comprehensive security strategy&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/3-reasons-msps-must-evolve-beyond-endpoint-detection-and-response\/\">3 Reasons MSPs Must Evolve Beyond Endpoint Detection and Response<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[18782,12756,714,22487],"class_list":["post-16921","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-managed-detection-and-response","tag-msp","tag-security","tag-xdr"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16921"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16921\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16921"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}