WhitepaperEndpointProtectionBuyersGuide2024
WhitepaperEndpointProtectionBuyersGuide2024
Endpoint
Protection
Buyer’s Guide
Critical Capabilities for
Modern Endpoint Protection
CrowdStrike White Paper 2
Endpoint Protection Buyer’s Guide
Table of Contents
Element 1: Prevention 5
Advanced Technologies 10
Unified Protection 10
Conclusion 11
CrowdStrike White Paper 3
Endpoint Protection Buyer’s Guide
Protecting endpoints stands out as one of the most critical security challenges in the modern
workplace. Despite this, organizations have historically treated endpoint solutions primarily as basic
device management tools, overlooking the fact that endpoints are prime targets for attackers. The
surge in remote and hybrid work arrangements has further heightened the risk, with adversaries
intensifying efforts to exploit any disparities in control and security. The proliferation of new,
often unsecured access points to networks and data, coupled with the rapid deployment of new
infrastructure, has provided threat actors with an expanded attack surface, allowing them to escalate
both the volume and reach of their activities.
According to IBM, “Various studies estimate that as many as 90% of successful cyberattacks … originate
at endpoint devices.”1 As adversaries seek to establish a foothold for launching identity-based attacks,
they are pivoting to cloud infrastructure, exploiting vulnerabilities and more.
The escalating pace and sophistication of threats have compelled security and IT teams to evaluate
their current endpoint security capabilities. Yesterday’s signature-dependent security solutions
with heavy agents, high maintenance overhead and a disjointed user experience are ineffective and
inefficient, bogging down security teams and leaving companies vulnerable to compromise.
In response to these challenges, CrowdStrike has created this guide to assist you in effectively
safeguarding your organization against modern threats. The guide aims to delineate the essential
components and elements that constitute a modern endpoint protection strategy.
Sophisticated threat actors actively seek out gaps in security silos, demanding more than just a
collection of disparate security products. To be genuinely effective, an endpoint protection solution
must be meticulously designed to enhance analyst workflows while prioritizing resilience against
threats throughout the entire attack continuum.
1
IBM, “What is endpoint security?”: https://www.ibm.com/topics/endpoint-security
CrowdStrike White Paper 4
Endpoint Protection Buyer’s Guide
A cloud-native approach facilitates the effortless aggregation, sharing and operationalization of this
information, providing the kind of anticipation, prevention, detection, visibility and response capabilities
that can outperform a determined attacker time and time again.
When seeking a modern endpoint security solution, it's important to consider one that unifies key
elements and capabilities. Unified, tightly integrated capabilities can provide complete attack visibility
and enable teams to quickly understand threats and take decisive action. Teams can triage, investigate
and remediate faster with a comprehensive, unified source of truth. The agent should also be unified,
enabling organizations to expand their security over time without the need to add additional agents in the
future. This allows security teams to activate new protections in seconds, all while utilizing the same agent
deployed on Day One. As organizations intensify efforts to combat increasingly sophisticated attacks,
the ability to surface information effectively becomes paramount. Unified protection allows you to query
vast data across your entire security posture, extracting the information needed to make better, faster
decisions.
These necessities should be a focus when selecting your endpoint security solution. With these
considerations in mind, we will now explore the five elements that constitute modern endpoint protection,
including the key capabilities a modern endpoint protection solution should possess and the features
required for those capabilities to be effective:
• Prevention
• Threat Intelligence
2
IDC, How Many Security Tools Do Organizations Have, and What Are Their Consolidation Plans? Document number: #US51973524, Mar 2024,
https://www.idc.com/getdoc.jsp?containerId=US51973524
CrowdStrike White Paper 5
Endpoint Protection Buyer’s Guide
There are sound reasons why traditional, malware-centric endpoint protection products simply do not
provide an adequate level of protection against today’s threats and adversaries.
An effective endpoint protection solution needs to solve this challenge by expanding beyond merely
identifying and addressing known malware. It should:
• Protect against known and unknown malware using technologies such as machine learning (ML) that
do not require daily updates and can generalize defenses against never-before-seen attacks.
• Look beyond malware and fully leverage behavioral analytics to automatically look for signs of an
attack and block them as they occur.
• Protect endpoints against all types of threats — from known and unknown malware to fileless and
malware-free attacks — by combining all necessary technologies for ultimate protection.
Detection of advanced and • Advanced behavioral analysis with indicators of attack (IOAs)
unknown threats, including
• High-performance memory scanning
fileless attacks
• Exploit mitigation
While NGAV is an important first line of defense for an organization, it is not foolproof. No NGAV solution, no
matter how advanced, can outright prevent every threat, particularly in the face of never-before-seen attacks
or those that take advantage of stolen credentials or trusted tools.
The next level of protection is EDR with built-in native extended detection and response (XDR). Previous
incarnations of threat detection solutions focus on basic functionality for endpoint monitoring. These legacy
monitoring tools frequently create extra work for analysts, inundating them with raw, unenriched telemetry and
alerts with very little actionable information. The more complicated the security tools, the greater the likelihood
that a security gap will be created and go unnoticed until there’s a breach.
Modern EDR addresses these issues. Modern EDR unlocks enterprise-wide visibility by unifying and streamlining
security analysis, investigation and remediation into one easy-to-use console. Additionally, built-in native XDR
extends security data correlation, analysis and workflows beyond the endpoint to encompass other native
capabilities such as identity threat prevention. This enhances visibility around advanced and evasive security
threats and allows for a more seamless and accurate response. EDR with built-in native XDR dramatically
improves threat visibility, accelerates security operations and eases the ever-present security staffing burden.
To outpace today’s adversaries, organizations must use EDR to optimize threat detection, investigation, hunting
and response enterprise-wide, and they must use native XDR to extend visibility and control across key attack
surfaces. When evaluating options, look for an EDR solution that includes XDR capabilities so it has the best
coverage over your full endpoint estate and beyond.
• Attack steps mapped to a standard industry attack framework such as MITRE ATT&CK®
• Captures raw events, even when not associated with alerts and detections
Detection of attacks • Operates in kernel mode for full visibility and to eliminate blind spots
that circumnavigate
prevention • Centralized data repository to enable advanced detection
• Remote access to — and the ability to interact with — endpoints in real time
• Ability for analysts to collaborate and work together on incidents in real time from any location
Accelerated remediation • Ability to run commands on suspicious endpoints remotely and in real time
and response • Ability to take response actions for other native capabilities across domains
If your endpoint protection doesn’t include identity security, you’re leaving the door open to opportunistic
adversaries. With the continued rise of malware-free attacks, adversaries are hunting for gaps between
how endpoints are secured and identities are managed. In many cases, adversaries aren’t breaking in,
they’re logging in. Once they know how to steal identities — and the privileged access credentials that go
with them — they can quickly gain access undetected.
Organizations use identity solutions to gain visibility into the security hygiene of their identity infrastructure,
such as Microsoft Active Directory and Entra ID. This helps proactively prevent identity-based threats before
they start. It is critical to identify compromised passwords, over-privileged accounts and other security
gaps that can leave your organization exposed. By unifying endpoint protection and identity security, you
can also get insights into possible attack paths that adversaries can exploit across the network.
ITDR solutions help organizations detect and respond to identity-based threats in real time. These threats
can include ransomware, lateral movement, service account misuse, Pass-the-Hash (PtH), Golden
Ticket attacks and more. When evaluating ITDR solutions, it is critical to ensure the ability to stop lateral
movement, including hybrid lateral movement from on-premises to cloud environments and from managed
to unmanaged devices. You should be able to create policies that correlate with the attack paths you’ve
identified and leverage known adversary tactics, techniques and procedures (TTPs).
Though it is critical to stop adversaries with real-time identity protection, organizations must continue to
enable business productivity in the process. That’s why applying risk-based conditional access — through
multifactor authentication (MFA) — needs to be included in the ITDR solution. The solution should allow you
to establish baselines of normal user behavior to quickly identify anomalies as sophisticated adversaries
move across endpoints and identities. Then, you can enforce MFA to increase security without disrupting
legitimate users.
Reduce identity store attack • Automatically classify all identities (i.e., human and service accounts)
surface • Gain insights into identity store hygiene, including potentially compromised
accounts
Detect and prevent identity- • Create policies that correlate with the attack paths and known adversary TTPs
based threats • Address vulnerabilities inherent in cloud and Active Directory identity stores
Without threat intelligence integrated into your endpoint protection, it becomes challenging for both
protection technologies and security professionals to keep up with the latest threats and proactively
defend against them.
Threat intelligence elevates NGAV and EDR/XDR detections to the next level, not only revealing what
happened on the endpoint but exposing the "who, why and how" behind the attack. Understanding the
threat at this level is crucial for staying ahead of future attacks and increasing the cost to the adversary.
Moreover, threat intelligence furnishes security teams with the information necessary to comprehend,
respond to and resolve incidents more swiftly, thereby accelerating investigations and incident remediation.
When assessing endpoint protection, it's essential to look beyond security infrastructure. Actionable threat
intelligence must be an integral part of the total solution. Customers should ensure that the intelligence
seamlessly integrates into the endpoint protection solution and that its consumption can be automated.
Proactive threat hunting, led by human security experts powered by AI, is a must for any organization
seeking to achieve or enhance real-time threat detection and incident response.
Threat hunting plays a crucial role in the early detection of attacks and adversaries. Instead of relying
on reactive, preset defenses, human-led investigations actively search for suspicious activities, avoiding
passive reliance on autonomous solutions to detect and alert automatically. This approach enables
organizations to identify malicious activity early and thwart attacks before irreparable damage occurs.
Although critical, threat hunting is only as good as the threat intelligence on which it’s based. Threat
hunting must be informed by the intelligence gathered from an organization’s environment to identify
novel attacks, misuse of remote access tools, credential compromises, insider threats and more. When
evaluating a threat hunting solution, ensure that it’s intelligence-led and can be applied across both
endpoint and identity protection.
Unfortunately, a lack of resources and a shortage of security expertise make proactive threat hunting
unattainable for most organizations. According to the 2023 ISC2 Cybersecurity Workforce Study, nearly
4 million additional cybersecurity workers are needed to effectively secure assets.3
Understaffed internal teams struggle to maintain 24/7 monitoring for adversary activity, and often, they
lack the capability to efficiently respond to highly sophisticated attacks. This can lead to prolonged
investigation times with fewer alerts handled promptly, ultimately resulting in extended dwell times and an
increased risk that attackers will successfully achieve their goals.
Managed threat hunting addresses this challenge by providing an elite hunting team. This team not only
identifies malicious activities that may have been overlooked by automated security systems but conducts
thorough analyses and provides customers with response guidelines. When considering a modern
endpoint security solution, it's crucial to choose one that seamlessly enables managed threat hunting.
• Experienced and dedicated threat hunters providing 24/7 threat hunting services
24/7 human expertise • Ability to find novel threats that no other systems have detected
• Automatic and native integration with threat intelligence for ultimate efficiency
• Ability to pinpoint the most urgent threats in the environment across both endpoint
Visibility into missed alerts and identity
3
ISC2 Cybersecurity Workforce Study 2023: How the Economy, Skills Gap and Artificial Intelligence are Challenging the Global Cybersecurity Workforce,
https://media.isc2.org/-/media/Project/ISC2/Main/Media/documents/research/ISC2_Cybersecurity_Workforce_Study_2023.pdf
CrowdStrike White Paper 10
Endpoint Protection Buyer’s Guide
Advanced Technologies
Since the company’s founding in 2011, CrowdStrike has pioneered the use of AI and ML in cybersecurity
to solve customers’ most pressing challenges. CrowdStrike's endpoint protection solution incorporates
innovative technologies — including AI/ML, behavior protection and exploit mitigation — to thwart the rapidly
evolving TTPs adversaries use to breach organizations. This encompasses commodity malware, zero-day
malware and even advanced malware-free attacks.
Through the use of AI/ML, CrowdStrike avoids dependence on signature-based methods or IOCs, which
can result in "silent failure" and allow data breaches to occur. Instead, CrowdStrike adopts behavioral
approaches that actively search for IOAs, ensuring that the business is alerted to suspicious activities before
a compromise takes place. AI-powered IOAs are the latest evolution of CrowdStrike’s industry-first IOAs,
expanding protection with the combined power of cloud-native machine learning and human expertise.
AI-powered IOAs use the speed, scale and accuracy of the cloud to rapidly detect emerging classes of
threats and predict adversarial patterns, regardless of the tools or malware used.
In conjunction with the single, lightweight agent, CrowdStrike's endpoint protection delivers faster
deployment times, improved endpoint performance and greater operational ease for the IT team due to its
cloud-native approach. Deployed in minutes, the Falcon platform operates from Day One without the need
for constant signature updates, on-premises management infrastructure or complex integrations, and it
functions without interrupting your existing antivirus during migration.
Unified Protection
One of the most important factors to consider when selecting an endpoint protection solution is how it will
integrate within the broader cybersecurity architecture without adding complexity or requiring any on-
premises management infrastructure.
The Falcon platform is designed as a highly modular and extensible offering that assists customers in
addressing new security challenges with a single agent and without the need to re-architect or re-engineer
their architecture, eliminating the friction associated with security deployments.
More and more organizations are rethinking their cybersecurity strategies and are looking for a more
integrated approach. An example of this is unifying endpoint protection and ITDR to remove coverage gaps
and the complexity that comes when these solutions are deployed separately. With unified protection that
includes endpoint and identity, you can reduce risk and improve productivity. By having unified endpoint and
identity security, organizations can respond to threats up to 85% faster, offsetting up to 5,000 investigation
hours annually.4
4
Expected results and actual outcomes are not guaranteed and may vary for every customer. Expected benefits are based on aggregated averages from over 100
Business Value Assessment (BVA) and Business Value Realized (BVR) cases conducted with CrowdStrike Enterprise customers and completed by CrowdStrike’s
Business Value team from 2018 to December 2022. BVAs are a projected ROI analysis based on the value of CrowdStrike compared to the customer’s incumbent
solution. BVRs are a realized ROI analysis for customers deployed for 6+ months using customer inputs and recorded telemetry.
CrowdStrike White Paper 11
Endpoint Protection Buyer’s Guide
Beyond unifying endpoint protection with ITDR, research shows that unifying security products has
significant benefits. In a recent study conducted by IDC that analyzed the value of unifying Falcon modules,
security teams found that their security operations improved by helping them identify 96% more potential
threats in half the time. Additionally, security teams' ability to keep up with adversaries was enhanced,
making them 2x more effective and enabling them to investigate/respond 66% faster.
CrowdStrike Falcon® Complete Next-Gen MDR provides 24/7 protection and elite expertise powered by
the AI-native Falcon platform. Operating as a seamless extension of customer teams, Falcon Complete
Next-Gen MDR delivers expert platform management and monitoring as well as advanced threat detection,
investigation and response across all key attack surfaces, including endpoint, cloud and identity. With
integrated intelligence and threat hunting delivered by CrowdStrike Falcon® Adversary OverWatch, Falcon
Complete Next-Gen MDR delivers protection against even the most sophisticated threats and accelerates
mean time to respond (MTTR), helping organizations close the cybersecurity skills gap.
Conclusion
The endpoint protection landscape has undergone a significant evolution, propelled by the increasing
sophistication of cyber threats and the dynamic nature of modern work environments. Paired with the five
critical capabilities outlined in this buyer's guide, the Falcon platform's advanced technologies;
single-agent, cloud-native approach; unified protection; and managed security services position
CrowdStrike as a leader in the realm of modern endpoint security. As organizations navigate the evolving
threat landscape, adopting a comprehensive solution that aligns with the outlined necessities becomes
imperative for achieving robust protection and resilience against contemporary cyber threats.
About CrowdStrike
CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the
world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints
and cloud workloads, identity and data.
Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform
leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched
telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and
remediation, elite threat hunting and prioritized observability of vulnerabilities.
Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid
and scalable deployment, superior protection and performance, reduced complexity and immediate time-
to-value.