In the past year we’ve seen an influx of endpoint detection and response (EDR) tools that promise to bring order, through greater visibility, to the wild west of endpoints within a large organization.
The scenario is all too common: IT security usually doesn’t know all of the hardware and software assets that need to be protected, yet has to protect them.