What is endpoint security?
Explore IBM's endpoint security solution Subscribe to Security Topic Updates
Illustration with collage of pictograms of clouds, mobile phone, fingerprint, check mark
What is endpoint security?

Endpoint security, a network's critical first line of cybersecurity defense, protects end users and endpoint devices—desktops, laptops, mobile devices, servers and others—against cyberattacks.

Endpoint security also protects the network against adversaries who attempt to use endpoint devices to launch cyberattacks on sensitive data and other assets on the network.

Endpoints remain the primary enterprise network entry point for cyberattacks. Various studies estimate that as many as 90% of successful cyberattacks and as many as 70% of successful data breaches originate at endpoint devices. According to the IBM Security® Cost of a Data Breach Report 2023the average data breach cost companies USD 4.45 million.

Today companies must protect more endpoints, and more kinds of endpoints, than ever before. Bring-your-own-device (BYOD) policies, increased remote work, and the surging number of IoT devices, customer-facing devices and network-connected products have multiplied the endpoints that hackers can exploit, and the vulnerabilities that security teams must secure.

 

IBM Security X-Force Threat Intelligence Index

Gain insights to prepare and respond to cyberattacks with greater speed and effectiveness with the IBM Security X-Force Threat Intelligence Index.

Related content

Register for the Cost of a Data Breach report

Learn more about UEM for frontline workers
Antivirus software

The original endpoint security software, antivirus software protects endpoints against known forms of malware - Trojans, worms, adware and more.

Traditional antivirus software scanned the files on an endpoint device for malware signatures - strings of bytes characteristic to known viruses or malware.  The software alerted the user or admin when a virus was found, and provided tools for isolating and removing the virus and repairing any infected files.

Today's antivirus software, often called next-generation antivirus (NGAV), can identify and fight newer types of malware, including malware that leaves no signature. For example, NGAV can detect fileless malware - malware that resides in memory and injects malicious scripts into the code of legitimate applications. NGAV can also identify suspicious activity using heuristics, which compare suspicious behavior patterns to those of known viruses, and integrity scanning, which scans files for signs of virus or malware infection.

Endpoint protection platforms (EPPs)

Antivirus software alone may be adequate for securing a handful of endpoints. Anything beyond that typically requires an enterprise protection platform, or EPP. An EPP combines NGAV with other endpoint security solutions, including:

  • Web control: Sometimes called a web filter, this software protects users and your organization from malicious code hidden in web sites, or within files users download. Web control software also includes whitelisting and blacklisting capabilities that let a security team control which sites users can visit.
  • Data classification and data loss prevention: These technologies document where sensitive data is stored, whether in the cloud or on premises, and prevent unauthorized access to, or disclosure of, that data.
  • Integrated firewalls: These firewalls are hardware or software that enforce network security by preventing unauthorized traffic into and out of the network.
  • Email gateways: These gateways are software that screen incoming email to block phishing and social engineering attacks.
  • Application control: This technology enables security teams to monitor and control the installation and use of applications on devices and can block the use and execution of unsafe or unauthorized apps.

An EPP integrates these endpoint solutions in a central management console, where security teams or system admins can monitor and manage security for all endpoints. For example, an EPP can assign the appropriate security tools to each endpoint, update or patch those tools as needed, and administer corporate security policies.

EPPs can be on-premises or cloud-based. But industry analyst Gartner (link resides outside ibm.com), which first defined the EPP category, notes that ‘Desirable EPP solutions are primarily cloud-managed, allowing the continuous monitoring and collection of activity data, along with the ability to take remote remediation actions, whether the endpoint is on the corporate network or outside of the office.’

 

Endpoint detection and response (EDR)

EPPs focuse on preventing known threats, or threats that behave in known ways. Another class of endpoint security solution, called endpoint detection and response(EDR), enables security teams to respond to threats that sneak past preventative endpoint security tools. 

EDR solutions continuously monitor the files and applications that enter each device, hunting for suspicious or malicious activity that indicates malware, ransomware or advanced threats. EDR also continuously collects detailed security data and telemetry, storing it in a data lake where it can be used for real-time analysis, root cause investigation, threat hunting and more.

EDR typically includes advanced analytics, behavioral analysis, artificial intelligence (AI) and machine learning, automation capabilities, intelligent alerting, and investigation and remediation functionality that enable security teams to:

  • Correlate indicators of compromise (IOCs) and other endpoint security data with threat intelligence feeds to detect advanced threats in real time.
  • Receive notifications of suspicious activity or actual threats in real time, together with contextual data that can help isolate root causes and accelerate threat investigation. 
  • Perform static analysis( analysis of suspected malicious or infected code) or dynamic analysis (execution of suspcious code in isolation).
  • Set thresholds for endpoint behaviors and alerts for when those thresholds are exceeded.
  • Automate responses, such as disconnecting and quarantining individual devices, or blocking processes, to mitigate damage until the threat can be resolved.
  • Determine if other endpoint devices are being impacted by the same cyberattack.

Many newer or more advanced EPPs include some EDR capabilities, but for complete endpoint protection encompassing prevention and response, most enterprises should employ both technologies.

Extended detection and response (XDR)

Extended detection and response, or XDR, extends the EDR threat detection and response model to all areas or layers of the infrastructure, protecting not only endpoint devices but applications, databases and storage, networks, and cloud workloads. A software-as-a-service (SaaS) offering, XDR protects on-premises and cloud resources. Some XDR platforms integrate security products from a single vendor or cloud service provider, but the best also allow organizations to add and integrate the security solutions they prefer.

Related solutions EDR solutions

Bring a unique approach to EDR and endpoint security using automation and AI to detect and remediate threats in near real time.

Mobile security solutions

Stop mobile security threats with enterprise mobile security solutions that enable flexible delivery of apps, content and resources across devices.

Unified endpoint management solutions

Take an open cloud, AI approach to secure and manage any device with unified endpoint management (UEM) solutions.

Network security solutions

Secure network infrastructure against advanced threats and malware with next-generation threat protection and real-time threat intelligence.

Zero trust security solutions

Deliver zero trust security solutions for the enterprise to protect data and resources by making them accessible only when all criteria are met.

Cloud security solutions

Provide security for your hybrid cloud environment by integrating security into every phase of your journey.

Data encryption solutions

Protect enterprise data and address regulatory compliance with data-centric security solutions and services.

SIEM solutions

Centralize your ability to detect, investigate and respond to your most critical organization-wide cybersecurity threats.

Resources
IBM Security Framing and Discovery Workshop

Understand your cybersecurity landscape and prioritize initiatives together with senior IBM security architects and consultants in a no-cost, virtual or in-person, 3-hour design thinking session.

Request a workshop
Cost of a data breach

The Cost of a Data Breach Report explores financial impacts and security measures that can help your organization avoid a data breach, or in the event of a breach, mitigate costs.

Read the 2023 Cost of a Data Breach Report
Mobile security

An integrated approach to better visibility and control over your mobile organization.

Learn more
Advanced endpoint protection versus risk-based application patching versus laptop management

Learn about the similarities and differences between advanced endpoint protection, laptop management and risk-based application patching.

Read the blog post
MDM vs. MAM: Top 5 differences

Learn more about differences between mobile device management and mobile application management, in order to make sure your mobile devices, users and data remain protected.

Read the blog post
Security topics Managed firewall service

IBM firewall management services helps improve your security posture with robust firewall security management.

Endpoint security management services

IBM Security endpoint security management services include consulting and managed endpoint security across a wide range of endpoint protection solutions.

What is zero trust?

Zero trust is a framework that assumes a complex network’s security is always at risk to external and internal threats.

End-to-end encryption

End-to-end encryption (E2EE) is a secure communication process that prevents third parties from accessing data transferred from one endpoint to another.

Network security

Network security protects IT infrastructure from various threats by blocking unauthorized access to your network and the devices connected to that network.

Mobile device management (MDM)

MDM is a proven methodology and toolset used to provide a workforce mobile productivity tools and applications while keeping corporate data secure.

Data security

Find out how data security helps protect digital information from unauthorized access, corruption, or theft throughout its entire lifecycle.

SIEM

SIEM technology provides the advanced threat detection and security automation necessary to help organizations scale while maximizing IT compliance and business continuity.

IBM Security

IBM Security works with you to help protect your business with an advanced and integrated portfolio of enterprise security products and services.

Take the next step

As flexible work models have become the new norm, employees must remain productive when working from anywhere on any device in a protected way. From endpoint management to native security, IBM Security MaaS360 provides an end-to-end UEM solution. 

Explore MaaS360 Book a live demo