{"id":807,"date":"2018-10-04T00:00:00","date_gmt":"2018-10-04T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2018\/10\/04\/endpoint-security-its-way-more-complicated-than-you-think\/"},"modified":"2023-01-20T19:45:01","modified_gmt":"2023-01-20T19:45:01","slug":"endpoint-security-its-way-more-complicated-than-you-think","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/","title":{"rendered":"Endpoint Security: It&#8217;s Way More Complicated than You Think"},"content":{"rendered":"<div id=\"article-content\">\n<div id=\"article-ads\">\n<div class=\"hidden-xs\">\n<div id=\"daily-newsletter\" class=\"row\">\n<div class=\"text-center\">\n<div class=\"col-md-6 col-md-offset-3\">\n<div id=\"namecard-input-groupwz\" class=\"input-group\">\n<p><span style=\"font-family: Verdana, BlinkMacSystemFont, -apple-system, 'Segoe UI', Roboto, Oxygen, Ubuntu, Cantarell, 'Open Sans', 'Helvetica Neue', sans-serif;\">The term &#8220;<\/span>endpoint security<span style=\"font-family: Verdana, BlinkMacSystemFont, -apple-system, 'Segoe UI', Roboto, Oxygen, Ubuntu, Cantarell, 'Open Sans', 'Helvetica Neue', sans-serif;\">&#8221; is often used by vendors and security professionals alike, but what is it really all about? While it might seem obvious that endpoint security by definition is all about defending endpoints, as opposed to say networks, there are many levels of nuance and technologies involved in endpoint security.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>In a session at the SecTor security conference in Toronto, Kurtis Armour, principal security specialist at Scalar Decisions, provided an overview of the endpoint security landscape from a <a href=\"https:\/\/www.esecurityplanet.com\/networks\/penetration-testing\/\">penetration tester<\/a>&#8216;s point of view.<\/p>\n<p>Endpoint protection technologies are intended to give organizations the ability to detect and respond to security events within their environments.<\/p>\n<h2>How endpoints are compromised<\/h2>\n<p>Armour said endpoints are being compromised by a variety of different methods that ultimately aim to gain some kind of foothold in a victim system. Among the most popular forms of endpoint exploits is the use of various dropper technologies, which literally &#8216;drop&#8217; a malicious payload on an endpoint. Droppers can be delivered via malicious files, links and macros, among other infection vectors.<\/p>\n<p>Endpoints are being compromised for a variety of different reasons: insufficient security controls, lack of user education, lack of <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">patch management<\/a> and lack of environment hardening.<\/p>\n<h2>The endpoint security stack<\/h2>\n<p>While attackers have multiple tools for exploiting endpoints, organizations also have multiple tools that can be used to make up a complete endpoint security stack, including:<\/p>\n<ul>\n<li><a href=\"#EPP\">Endpoint protection platform (EPP) <\/a><\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/#EDR\">Endpoint detection and response (EDR) <\/a><\/li>\n<li><a href=\"#whitelisting\">Application whitelisting<\/a><\/li>\n<li><a href=\"#privilegemanagement\">Privilege management<\/a><\/li>\n<li><a href=\"#vulnerabilitymanagement\">Vulnerability and patch management<\/a><\/li>\n<li><a href=\"#oshardening\">OS hardening<\/a><\/li>\n<li><a href=\"#deception\">Deception<\/a><\/li>\n<li><a href=\"#alerting\">Central alerting and monitoring<\/a><\/li>\n<\/ul>\n<h2><a name=\"EPP\"><\/a>Endpoint protection platform (EPP)<\/h2>\n<p>Armour said the goal of an Endpoint Protection Platform is all about preventing code execution.<\/p>\n<p>EPP technologies include anti-virus (AV) and anti-<a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> technologies that aim to block malicious code from running on endpoints. EPP can be used to block known vulnerabilities as well. EPP has expanded in recent years beyond its AV roots and can also include <a href=\"https:\/\/www.esecurityplanet.com\/networks\/encryption\/\">encryption<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/data-loss-prevention-dlp-solutions\/\">data loss prevention (DLP)<\/a> capabilities.<\/p>\n<h2><a name=\"EDR\"><\/a>Endpoint detection and response (EDR)<\/h2>\n<p>Armour said sometimes the prevention capabilities that an EPP provides aren&#8217;t enough, and that&#8217;s where data recorders for endpoints come in as part of <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">endpoint detection and response (EDR)<\/a> platforms.<\/p>\n<p>EDR gives organizations the ability to see what&#8217;s happening on an endpoint and enables security professionals to hunt for bad things that might be present in an environment that an EPP might not know about.<\/p>\n<p>Capabilities commonly found in EDR include: a recording system, behavior detection capabilities, data search, suspicious activity detection and response capabilities.<\/p>\n<p><em>If you&#8217;re looking for an EDR solution be sure to try out eSecurity Planet&#8217;s <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-detection-and-response-selection-tool\/\">EDR selection tool<\/a><\/em><\/p>\n<h2><a name=\"whitelisting\"><\/a>Application and process whitelisting<\/h2>\n<p>In Armour&#8217;s view, application whitelisting is perhaps the number one approach used by organizations to stop file-based malware from executing in a corporate environment.<\/p>\n<p>Implementing application whitelisting isn&#8217;t always an easy task though. Armour said organizations need to first have a strategy in place to determine what asset will be covered. Application whitelisting isn&#8217;t effective for dynamic users where things change often, but Armour said it can be beneficial for static servers or <a href=\"https:\/\/www.esecurityplanet.com\/applications\/pos-security\/\">point-of-sale (POS) systems<\/a> that are intended to be limited to certain range of tasks.<\/p>\n<p>Process whitelisting is another endpoint security approach that can be highly effective. Armour noted that Microsoft Windows Device Guard feature can be used to explicitly allow process that are trusted to run, while blocking the execution of unknown, untrusted processes.<\/p>\n<h2><a name=\"privilegemanagement\"><\/a>Privilege management<\/h2>\n<p>Protecting <a href=\"https:\/\/www.esecurityplanet.com\/applications\/tips-for-privileged-access-management-pam\/\">privileged accounts<\/a> is a core element of endpoint security, as one of the main activities that an attacker does is steal credentials in order to gain wider access to an environment.<\/p>\n<p>Privileged accounts include local administrator accounts as well as domain-level accounts. Armour said that if an attacker can compromise one system in an environment and there are shared passwords across the entire organization for local admins, the attacker will be able to authenticate across the entire organization.<\/p>\n<p>Privilege management technologies enable organizations to limit the ability for password compromise and reuse.<\/p>\n<h2><a name=\"vulnerabilitymanagement\"><\/a>Vulnerability and patch management<\/h2>\n<p>Vulnerability and patch management technologies are two different but highly related capabilities that are often tightly integrated.<\/p>\n<p>Armour said vulnerability management technology is used to identify unknown security vulnerabilities within an organization.<\/p>\n<p>&#8220;Knowing that and being able to patch that information makes it so that someone cannot exploit an application or an operating system that is vulnerable to attack,&#8221; he said. &#8220;Patch management obviously goes hand in hand with vulnerability management. You have to be able to patch the vulnerabilities that you know about.&#8221;<\/p>\n<p><em>Looking for more information on patch management? Check out the eSecurity Planet Guide to the <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">Top 10 Patch Management solutions<\/a><\/em><\/p>\n<h2><a name=\"oshardening\"><\/a>Operating system hardening<\/h2>\n<p>Operating Systems such as Windows, Linux and MacOS don&#8217;t always have the most secure setting on by default. Armour said there are multiple steps organizations can take to harden desktop operating systems to make it harder for attackers to compromise.<\/p>\n<p>Armour said hardening takes time and is specific to each corporate environment.<\/p>\n<h2><a name=\"deception\"><\/a>Deception<\/h2>\n<p>An increasingly popular endpoint security approach in recent years has been the use of <a href=\"https:\/\/www.esecurityplanet.com\/networks\/deception-technology\/\">deception techniques<\/a> to trick attackers.<\/p>\n<p>With deception technologies, bogus credentials and services are presented to an attacker. When the deception services are attacked, the organization is alerted and can take additional steps to limit risks and protect the rest of their environment.<\/p>\n<p>&#8220;Deception is used as an early indicator of threat actors in your environment,&#8221; he said.<\/p>\n<h2><a name=\"alerting\"><\/a>Central alerting and monitoring<\/h2>\n<p>While having the other elements of an endpoint security stack are important, Armour said that having the ability to ingest alerts from across an enterprise infrastructure is critical.<\/p>\n<p>&#8220;If you&#8217;re not looking at the entire endpoint environment, you could miss something that is happening,&#8221; he said.<\/p>\n<p>He added that visibility into alerts from a central location is key to being able to respond in a timely fashion.<\/p>\n<p><em>Security information and event management SIEM can also play a role in monitoring, learn more in eSecurityPlanet&#8217;s <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\">SIEM guide<\/a><\/em><\/p>\n<h2>The endpoint maturity model<\/h2>\n<p>Having an endpoint security stack is one thing, but having one that properly limits risk can be another discussion altogether. Armour suggests that a comprehensive endpoint security stack needs to be comprehensively deployed.<\/p>\n<p>&#8220;When you&#8217;re looking at your endpoint security strategy, you need to cover your entire environment,&#8221; he said. &#8220;So make sure that you know what assets are in your organization and that you&#8217;re doing an assessment, and make sure that they&#8217;re covered by your endpoint security strategy.&#8221;<\/p>\n<p>Additionally, it&#8217;s important for organizations to make full use of the capabilities that are present in the endpoint security technologies that are deployed. Armour also suggests that organization get proper training and implementation support for endpoint security technologies rather than trying to do it on their own.<\/p>\n<p>&#8220;Don&#8217;t just buy something and implement it yourself, especially if it&#8217;s a difficult product to implement, because that is going to be a failed deployment,&#8221; he said.<\/p>\n<p>Read Next: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/next-gen-endpoint-security-solutions\/\">Best Next-Gen Endpoint Security Solutions<\/a><\/p>\n<p><em>Sean Michael Kerner is a senior editor at eSecurityPlanet and InternetNews.com. Follow him on Twitter @TechJournalist.<\/em><\/p>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d6dbb897815-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6dbb897815\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6dbb897815\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6dbb897815\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6dbb897815\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6dbb897815\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6dbb897815\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The term &#8220;endpoint security&#8221; is often used by vendors and security professionals alike, but what is it really all about? While it might seem obvious that endpoint security by definition is all about defending endpoints, as opposed to say networks, there are many levels of nuance and technologies involved in endpoint security. In a session [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[19],"tags":[28055,14404,30655,23006],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[378],"class_list":["post-807","post","type-post","status-publish","format-standard","hentry","category-endpoint","tag-edr","tag-endpoint-security","tag-epp","tag-patch-management","b2b_audience-awareness-and-consideration","b2b_product-endpoint-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Guide to the Complete Endpoint Security Stack<\/title>\n<meta name=\"description\" content=\"There are a number of different security technologies that can help you create a complete endpoint security stack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Guide to the Complete Endpoint Security Stack\" \/>\n<meta property=\"og:description\" content=\"There are a number of different security technologies that can help you create a complete endpoint security stack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-04T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-20T19:45:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sean Michael Kerner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sean Michael Kerner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/\"},\"author\":{\"name\":\"Sean Michael Kerner\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0\"},\"headline\":\"Endpoint Security: It&#8217;s Way More Complicated than You Think\",\"datePublished\":\"2018-10-04T00:00:00+00:00\",\"dateModified\":\"2023-01-20T19:45:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/\"},\"wordCount\":1186,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"keywords\":[\"EDR\",\"endpoint security\",\"EPP\",\"Patch Management\"],\"articleSection\":[\"Endpoint\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/\",\"name\":\"Guide to the Complete Endpoint Security Stack\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2018-10-04T00:00:00+00:00\",\"dateModified\":\"2023-01-20T19:45:01+00:00\",\"description\":\"There are a number of different security technologies that can help you create a complete endpoint security stack.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Endpoint Security: It&#8217;s Way More Complicated than You Think\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0\",\"name\":\"Sean Michael Kerner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png\",\"caption\":\"Sean Michael Kerner\"},\"description\":\"Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/sean-michael-kerner-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Guide to the Complete Endpoint Security Stack","description":"There are a number of different security technologies that can help you create a complete endpoint security stack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/","og_locale":"en_US","og_type":"article","og_title":"Guide to the Complete Endpoint Security Stack","og_description":"There are a number of different security technologies that can help you create a complete endpoint security stack.","og_url":"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/","og_site_name":"eSecurity Planet","article_published_time":"2018-10-04T00:00:00+00:00","article_modified_time":"2023-01-20T19:45:01+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Sean Michael Kerner","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sean Michael Kerner","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/"},"author":{"name":"Sean Michael Kerner","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0"},"headline":"Endpoint Security: It&#8217;s Way More Complicated than You Think","datePublished":"2018-10-04T00:00:00+00:00","dateModified":"2023-01-20T19:45:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/"},"wordCount":1186,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"keywords":["EDR","endpoint security","EPP","Patch Management"],"articleSection":["Endpoint"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/","url":"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/","name":"Guide to the Complete Endpoint Security Stack","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2018-10-04T00:00:00+00:00","dateModified":"2023-01-20T19:45:01+00:00","description":"There are a number of different security technologies that can help you create a complete endpoint security stack.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Endpoint Security: It&#8217;s Way More Complicated than You Think"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0","name":"Sean Michael Kerner","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png","caption":"Sean Michael Kerner"},"description":"Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.","url":"https:\/\/www.esecurityplanet.com\/author\/sean-michael-kerner-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/807"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=807"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/807\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=807"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=807"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=807"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}