AEP Product Selection Guide - Part 3

AEP Product Selection Guide - Part 3

AUTHOR:

Jason Pappalexis 

OVERVIEW:

Security teams wishing to conduct efficient and meaningful POCs must understand use case by gathering information about their users, applications, devices, and their underlying network architecture. Incident response costs and infection response costs must also be well understood in order to make the right decision. The teams conducting the POCs are likely to be the same teams that manage an organization’s day-to-day security operations; thus, it is in their best interests to focus on the most viable product options.

This paper, the final in our three-part series on selecting AEP products, presents key published features of AEP products along with results from NSS’ first AEP group test, and is a resource for organizations conducting POCs.

Product features and NSS’ group test results from the following AEP vendors are compared in this report:

  • Carbon Black
  • CrowdStrike
  • Cylance
  • ESET
  • Fortinet
  • Invincea
  • Kaspersky Lab
  • Malwarebytes
  • McAfee
  • SentinelOne
  • Trend Micro
  • Sophos
  • Symantec

What’s in this report?

  • Planning stage and proof of concept recommendations
  • Endpoint protection planning stage considerations
  • AEP v1.0 NSS Labs group test result summary
  • The importance of use case and purchase decisions
  • Product feature tables, including agent operating system support, minimum resource requirements, ancillary security features as well as central management insight including threat visibility, system visibility and data sharing.

As with all NSS Labs group tests, there was no fee for participation. All testing was conducted independently and was not paid for by any vendor.