Kazmarek

Free Site Analysis 1-858-952-5400
REMOTE ASSISTANCE
  • Home
  • OnGoing Management
  • IT Services
    • Microsoft 365, Exchange Services, and Consulting
    • Cloud Solutions
    • Virtualization
    • Mobility
    • Backup & Disaster Recovery
    • Server Installation/Migration
    • VoIP
    • Network & System Administration
    • Additional Solutions
  • Why Kazmarek
    • Case Studies
    • Testimonials
    • KTS Values
  • For Clients
    • O365 Log In
    • Client Portal
    • KTS Documents
    • SonicWALL VPN Client
  • News
    • Newsletters
  • Who We Are
    • Company
    • Team
    • KTS E-Award Winners
    • KTS Values
    • Charities We Support
  • Contact Us
    • Contact Us
    • Careers

Issue No. 111November 2021

EDR – Tools for a Changing Threat Landscape

Information Security is among the chief concerns of most businesses. Whether these concerns have crystallized enough to be given the proper nomenclature, most business owners and stakeholders are concerned about their overall security posture. This raises any number of questions, such as: ‘How will this change affect the security of my business?’, ‘Are we doing enough to secure our systems and data?’. In the past, antivirus software would have taken up a good portion of these types of conversations. Many users, even today, feel secure in the knowledge that their computer systems are protected by antivirus software. That means that if something like ransomware were to gain access to their system, their antivirus would find and destroy it…right?

Unfortunately, this is often not the case, nor the full picture. Although a robust managed antivirus solution should be a part of any enterprise’s security posture, it is just one layer of security that must be in place for business-critical infrastructure to remain safe and secure. Typically, antivirus software must be working in conjunction with a firewall appliance to prevent malicious software from gaining access to an environment. This would also typically be coupled with robust spam filtering and perhaps phishing protection to secure one of the main points of egress into the network—email. Additionally, these systems should generally be paired with enterprise backup and recovery software to ensure that should an infection of some type gain a foothold into the network, it can always be eliminated by restoring from backups. Although all of these tools are critical, they are also missing a critical component—monitoring and notification.

For the sake of argument, assume that your business’ network is laid out similarly to my description above, and you have just been targeted by a criminal organization with ransomware. This version of ransomware is entirely new, having been specifically developed to target your enterprise. This means that many antivirus products wouldn’t be able to stop the virus that was disguised as an otherwise innocuous email. Since the ransomware payload gained entry to your network via an email to a mid-level employee, your firewall had no chance to detect or mitigate the threat. Since your antivirus software cannot see it, it cannot stop it either. What happens now? But wait, you say, we have backups! Indeed you do, and indeed assuming that they are configured in such a manner as to make them immune to potential infection and encryption by the same ransomware now cutting a catastrophic swathe through your network—how do you know when it is time to use them? How do you know that you have an unchecked outbreak happening under the watchful eyes of IT staff and security products? This then, is where EDR comes into the picture.

EDR stands for Endpoint Detection and Response, and is a newer addition to the security landscape than some of the more familiar technologies outlined above. Think of EDR as a security camera system for inside your network. Where your antivirus software may have missed detecting an infection because it had never seen it before, EDR won’t have the same issue because it monitors for behavior that looks like an infection. Because the software is looking out for the actions that the piece of ransomware takes, rather than for the ransomware itself, it is not hampered in the same way as even some top-of-the-line antivirus might be by a newer unrecognized, infection.

Consider again the same scenario, but this time with the addition of EDR deployed across the corporate network. The infection still sneaks past the firewall, and eludes antivirus deployed on workstations and server. The EDR, however, sees the traffic out from the ransomware software to command and control servers, along side thousands of encryption operations the software is performing and kicks into action.

Now, the simmering sickness spreading unchecked has been replaced with a blaring klaxon to your IT department. Something is very wrong indeed. Leveraging the rest of the security solutions already in place, IT can block the infection’s ability to spread, and quickly has a grasp if which systems have been affected. Backups are spun up and restores initiated. An unmitigated disaster becomes a crisis that can be contained, and managed.

The threat landscape for today’s businesses is constantly evolving. Ensure that your IT provider is deploying the most robust and capable solution stack possible to keep your infrastructure and livelihood safe.

Written by KTS Operations Manager, Tristan Collopy

Testimonials

Testimonials

“We’re building a solid IT foundation to be able to go where we need to be for growth and success. I couldn’t be more pleased with KTS’s performance and progress on our IT Projects.”

Shawn Ellis, CFO Custom Logos

Testimonials

“Both company email migrations have were completed without a problem. Thanks to your team both transitions went smooth.Everyone with your group are both knowledgeable and professional, and you should be proud of the organization you are building.”

John Sonnen, IT & Security Director Child Safety Network

Testimonials

“We have been using KTS for our IT support for about a year now, and we are very pleased with the service we have received. Chris has been our first line person, and has been able to resolve issues quickly, and often remotely, which helps reduce costs. Our staff has really appreciated his fast response and resolution to the issues that have come up. We have also appreciated that there are other folks at KTS who can fill in if Chris is out. Thanks to all!”

Suzy Halleland, Executive Administrator Village Church

Testimonials

“I think you know we have been very happy with your service and are very grateful to have been referred to you guys. But on a more personal note, I want you to know that Kevin in your office has provided a service for us that is way over the top.”

Jeff Golumbuk, CEO Custom Logos

Testimonials

“I just wanted to thank you and your staff for the excellent service and work provided by KTS.  It has been night and day compared to our old third party IT consultant.”
Nick Walters, VP Project Management West Coast General Corp.

Testimonials

“I wanted to let you know that I am absolutely delighted with the service we have received from you and your team so far. I know we put you in a tough position with such short notice of having to jump in and take over, and we really appreciated that. But there are many other reasons as well. First, I’m so glad they discovered the hard drive problem right away, as that could have caused us a huge issue as you well know. Second, everyone that I’ve had the pleasure to work wi… Read more
Jo Barsa, CPA Barsa & Company

Testimonials

“Kazmarek is fantastic!  I’ve used every size of IT company over the past 20 years and Kazmarek is by far superior to all I’ve used.  We are extremely happy with their service and expertise.  One of the things I like most about them is that they have engineers available to respond to our prioritized needs but they also wanted to give us the best customer service possible so they went above and beyond and put in place an escalation plan so that if I feel the response time i… Read more
Marisa Janine-Page, Partner Caldarelli Hejmanowski Page & Leer LLP

Testimonials

“I have thoroughly enjoyed working with the Kazmarek team through the years! They are responsive and have a great team to work with, whether it’s day-to-day IT needs or special projects. ”
KC Martin, HR Director Full Swing Golf

Testimonials

“As a local San Diego business, we were looking to partner with another local business after our IT needs just weren’t being met with a nationwide provider. We could not be happier with our decision since KTS has been very swift, attentive, and collaborative with our IT needs over the past three years. Their engineers, support desk, and managers are patient and able to effectively communicate issues and solutions to a layperson which speaks volumes about their hiring and customer… Read more
Carrie Lamb, Project Manager Chuao Chocolatier

When Was Your Last Backup?

When Was Your Last Backup?

If you don’t know, you’re not alone.
Find out more

Join Our Newsletter

Join Our Newsletter

Free On-Site Analysis

Free On-Site Analysis

Contact us to receive a 1-hour complimentary evaluation.
Learn more here.
  • This field is for validation purposes and should be left unchanged.

Copyrights: © 2023 Kazmarek. All rights reserved.

Designed by TinyFrog & N Halie Designs