Home Topics Endpoint security What is endpoint security?
Explore IBM's endpoint security solution Subscribe to security topic updates
Illustration with collage of pictograms of clouds, mobile phone, fingerprint, check mark
What is endpoint security?

Endpoint security, a network's critical first line of cybersecurity defense, protects end users and endpoint devices—desktops, laptops, mobile devices, servers and others—against cyberattacks.

Endpoint security also protects the network against adversaries who attempt to use endpoint devices to launch cyberattacks on sensitive data and other assets on the network.

Endpoints remain the primary enterprise network entry point for cyberattacks. Various studies estimate that as many as 90% of successful cyberattacks and as many as 70% of successful data breaches originate at endpoint devices. According to the IBM Security® Cost of a Data Breach Report 2023the average data breach cost companies USD 4.45 million.

Today companies must protect more endpoints, and more kinds of endpoints, than ever before. Bring-your-own-device (BYOD) policies, increased remote work, and the surging number of IoT devices, customer-facing devices and network-connected products have multiplied the endpoints that hackers can exploit, and the vulnerabilities that security teams must secure.


Unified Endpoint Management and Security

Senior analysts from ESG share how organizations can ensure that they’re making the right investments for a unified endpoint management (UEM) and security solution that works for all teams and all locations.

Related content

Register for the Cost of a Data Breach report

Learn more about UEM for frontline workers
Antivirus software

The original endpoint security software, antivirus software protects endpoints against known forms of malware - Trojans, worms, adware and more.

Traditional antivirus software scanned the files on an endpoint device for malware signatures - strings of bytes characteristic to known viruses or malware.  The software alerted the user or admin when a virus was found, and provided tools for isolating and removing the virus and repairing any infected files.

Today's antivirus software, often called next-generation antivirus (NGAV), can identify and fight newer types of malware, including malware that leaves no signature. For example, NGAV can detect fileless malware - malware that resides in memory and injects malicious scripts into the code of legitimate applications. NGAV can also identify suspicious activity using heuristics, which compare suspicious behavior patterns to those of known viruses, and integrity scanning, which scans files for signs of virus or malware infection.

Endpoint protection platforms (EPPs)

Antivirus software alone may be adequate for securing a handful of endpoints. Anything beyond that typically requires an enterprise protection platform, or EPP. An EPP combines NGAV with other endpoint security solutions, including:

  • Web control: Sometimes called a web filter, this software protects users and your organization from malicious code hidden in web sites, or within files users download. Web control software also includes whitelisting and blacklisting capabilities that let a security team control which sites users can visit.
  • Data classification and data loss prevention: These technologies document where sensitive data is stored, whether in the cloud or on premises, and prevent unauthorized access to, or disclosure of, that data.
  • Integrated firewalls: These firewalls are hardware or software that enforce network security by preventing unauthorized traffic into and out of the network.
  • Email gateways: These gateways are software that screen incoming email to block phishing and social engineering attacks.
  • Application control: This technology enables security teams to monitor and control the installation and use of applications on devices and can block the use and execution of unsafe or unauthorized apps.

An EPP integrates these endpoint solutions in a central management console, where security teams or system admins can monitor and manage security for all endpoints. For example, an EPP can assign the appropriate security tools to each endpoint, update or patch those tools as needed, and administer corporate security policies.

EPPs can be on-premises or cloud-based. But industry analyst Gartner (link resides outside ibm.com), which first defined the EPP category, notes that ‘Desirable EPP solutions are primarily cloud-managed, allowing the continuous monitoring and collection of activity data, along with the ability to take remote remediation actions, whether the endpoint is on the corporate network or outside of the office.’


Endpoint detection and response (EDR)

EPPs focuse on preventing known threats, or threats that behave in known ways. Another class of endpoint security solution, called endpoint detection and response(EDR), enables security teams to respond to threats that sneak past preventative endpoint security tools. 

EDR solutions continuously monitor the files and applications that enter each device, hunting for suspicious or malicious activity that indicates malware, ransomware or advanced threats. EDR also continuously collects detailed security data and telemetry, storing it in a data lake where it can be used for real-time analysis, root cause investigation, threat hunting and more.

EDR typically includes advanced analytics, behavioral analysis, artificial intelligence (AI) and machine learning, automation capabilities, intelligent alerting, and investigation and remediation functionality that enable security teams to:

  • Correlate indicators of compromise (IOCs) and other endpoint security data with threat intelligence feeds to detect advanced threats in real time.
  • Receive notifications of suspicious activity or actual threats in real time, together with contextual data that can help isolate root causes and accelerate threat investigation. 
  • Perform static analysis( analysis of suspected malicious or infected code) or dynamic analysis (execution of suspcious code in isolation).
  • Set thresholds for endpoint behaviors and alerts for when those thresholds are exceeded.
  • Automate responses, such as disconnecting and quarantining individual devices, or blocking processes, to mitigate damage until the threat can be resolved.
  • Determine if other endpoint devices are being impacted by the same cyberattack.

Many newer or more advanced EPPs include some EDR capabilities, but for complete endpoint protection encompassing prevention and response, most enterprises should employ both technologies.

Extended detection and response (XDR)

Extended detection and response, or XDR, extends the EDR threat detection and response model to all areas or layers of the infrastructure, protecting not only endpoint devices but applications, databases and storage, networks, and cloud workloads. A software-as-a-service (SaaS) offering, XDR protects on-premises and cloud resources. Some XDR platforms integrate security products from a single vendor or cloud service provider, but the best also allow organizations to add and integrate the security solutions they prefer.

Related solutions
Endpoint security management services

Modern endpoint management to protect your end users and their devices from the latest cybersecurity threats.

Explore endpoint security management services
Managed Security Services (MSS)

As your trusted advisors, IBM Security® specialists help you address your security needs, from the simplest to the most complex.

Explore Managed Security Services
Unified endpoint management (UEM) solutions

A single UEM solution offers more secure access, reduced risk against vulnerabilities and a satisfying user experience.

Explore UEM solutions
Resources MDM versus MAM: Top 5 differences

Learn the differences between mobile device management (MDM) and mobile application management (MAM), two core components of unified endpoint management (UEM).

IBM Security Framing and Discovery Workshop

Understand your cybersecurity landscape and prioritize initiatives together with senior IBM security architects and consultants in a no-cost, virtual or in-person, 3-hour design thinking session.

X-Force Threat Intelligence Index

Understanding attackers’ tactics is crucial to protecting your people, data and infrastructure.

Take the next step

As flexible work models have become the new norm, employees must remain productive when working from anywhere on any device in a protected way. From endpoint management to native security, IBM Security MaaS360 provides an end-to-end UEM solution. 

Explore MaaS360 Book a live demo