{"id":35748,"date":"2020-06-05T06:31:30","date_gmt":"2020-06-05T10:31:30","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=35748"},"modified":"2023-07-17T04:49:05","modified_gmt":"2023-07-17T08:49:05","slug":"choosing-cybersecurity-vendor","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/choosing-cybersecurity-vendor\/35748\/","title":{"rendered":"In a crowded field, take these three steps to choose the right endpoint protection vendor"},"content":{"rendered":"<p><u>Stay focused<\/u>. It\u2019s the perennial advice you\u2019ll hear as you strengthen and grow any small- to medium-sized business (SMB.) Avoid getting distracted. Keep things simple. Do less, but do it better.<\/p>\n<p>What does this age-old wisdom mean for cybersecurity? With <u><a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cybersecurity-economics-report-2019\/28913\/\" target=\"_blank\" rel=\"noopener nofollow\">cyberattacks becoming more common and more costly<\/a><\/u>, you might think you must give cybersecurity more of your time and effort.<\/p>\n<p>The answer may be both yes, and no. Choosing the right endpoint protection supplier can make your business life easier now and in future, as cybercriminals gets more imaginative and your business develops and grows.<\/p>\n<p>By endpoints, we mean any end of a digital communications connection, like servers, laptops and mobile devices. Endpoints need protecting with antivirus, anti-malware and a range of other protective solutions, but it needn\u2019t be complex. Many endpoint products now let you control it all from one place. Bulletproof endpoint protection should save you time and money \u2013 not just in avoiding the cost of a breach, but in ease of updates and patching, reducing pressure on your IT security team.<\/p>\n<h2>Getting endpoint security that keeps its promises<\/h2>\n<p>Before things get easier, you\u2019re faced with the choice of dozens of vendors.<\/p>\n<blockquote><p>Businesses large and small sometimes find they\u2019ve paid for what turns out to be a costly circus of infuriating design and underperforming features. How do you make sure you don\u2019t get seduced by empty promises?<\/p>\n<\/blockquote>\n<p>Kaspersky\u2019s <a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/06\/05062403\/195_KES_Cloud_Marketing_Whitepaper_Evaluation_Guide_Customer_0420_EN_GLB.pdf\">Endpoint security vendor evaluation guide<\/a> helps you get the right endpoint protection platform (EPP) for your business. The guide recommends a three-step approach to make sure you get the best solution for the type of business you run and your growth phase.<\/p>\n<h2>1.\u00a0 Research market opinions and independent test results<\/h2>\n<p>Any vendor can claim their product does what you need and does it well, but you need to get evidence to back it up. Take a long, hard look at what independent experts and customers write about the vendor\u2019s product and solutions. Rather than focusing on what the product can do, focus on how well those capacities perform.<\/p>\n<p>If you\u2019re interested in a vendor that performs poorly in some assessments, there may be a good reason. Look for information about why they might seem to underperform, including by asking the vendor or tester directly if needed.<\/p>\n<h3>Customer reviews<\/h3>\n<p>The gold standard of customer review evaluation is <u><a href=\"https:\/\/www.gartner.com\/en\/documents\/3896183\" target=\"_blank\" rel=\"noopener nofollow\">Gartner\u2019s peer insights customers\u2019 choice for endpoint protection platforms<\/a><\/u>. It compiles and analyses user reviews to reach a rating for each vendor.<\/p>\n<p>You should also check the vendor\u2019s help forums where users describe product problems. Look out for how quickly the vendor resolves the bugs users report.<\/p>\n<h3>Independent testing and review<\/h3>\n<p>The most accurate way to verify the vendor\u2019s capabilities against current cyber-threats is through independent tests and reviews by respected security industry experts. Look for evidence of solid performance across many tests.<\/p>\n<p>Laboratories that test technology against known, unknown and advanced threats include <u><a href=\"https:\/\/selabs.uk\/\" target=\"_blank\" rel=\"noopener nofollow\">SE Labs<\/a><\/u>, <u><a href=\"https:\/\/www.av-test.org\/en\/news\/av-test-awards-2019-products-recognized-for-outstanding-it-protection\/\" target=\"_blank\" rel=\"noopener nofollow\">AV-Test\u2019s awards<\/a><\/u> (especially AV-Test advanced endpoint protection test) and <u><a href=\"https:\/\/www.sonicwall.com\/products\/product-certifications\/icsa-labs\/\" target=\"_blank\" rel=\"noopener nofollow\">ICSA Labs<\/a><\/u>.<\/p>\n<h3>Analytical agency conclusions<\/h3>\n<p>Leading analytical agencies also rate vendors and give reasons, compiled by experts who know the sector. <u><a href=\"https:\/\/www.gartner.com\/en\/documents\/3956420\/magic-quadrant-for-endpoint-protection-platforms\" target=\"_blank\" rel=\"noopener nofollow\">Gartner magic quadrant for endpoint protection platforms<\/a><\/u>, the <u><a href=\"https:\/\/www.crowdstrike.com\/resources\/reports\/forrester-wave-endpoint-security-suites-q3-2019\/\" target=\"_blank\" rel=\"noopener nofollow\">Forrester Wave for endpoint security suites<\/a><\/u> and <u><a href=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/Landing\/2019\/Radicati_2019\/Endpoint_Security_-_Market_Quadrant_2019_final.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Radicati market quadrant for endpoint security<\/a><\/u> are all well respected.<\/p>\n<h2>2. Make a security criteria list<\/h2>\n<p>Defining your business\u2019s essential security needs will give you a more critical lens to examine the tests and reviews.<\/p>\n<p>When choosing a vendor, the most important thing is to judge the quality and capacity of their endpoint protection correctly. Global market intelligence provider IDC says <u><a href=\"https:\/\/www.rapid7.com\/blog\/post\/2016\/03\/31\/idc-says-70-of-successful-breaches-originate-on-the-endpoint\/\" target=\"_blank\" rel=\"noopener nofollow\">70 percent of cybersecurity breaches start at endpoints<\/a><\/u>. IDC also concluded it\u2019s something of a keystone in your cybersecurity arch: Related security products like <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/sharper-threat-intelligence\/\" target=\"_blank\" rel=\"noopener nofollow\">threat intelligence<\/a> and endpoint detection and response rely on effective endpoint protection.<\/p>\n<blockquote><p>Comprehensive endpoint protection needs sophisticated detection technologies to thwart multi-vector attacks, as well as evolving threats. But it must also be easy to set up and manage, and not impact on the end user.<\/p>\n<\/blockquote>\n<p>See <a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/06\/05062403\/195_KES_Cloud_Marketing_Whitepaper_Evaluation_Guide_Customer_0420_EN_GLB.pdf\">the Endpoint security vendor evaluation guide<\/a> for a full checklist of what to look for in a vendor.<\/p>\n<h2>3. Get to know the vendor\u2019s overall profile<\/h2>\n<p>Cybersecurity now affects many parts of your business \u2013 arguably all parts. Choosing a security vendor that has a wider range of security solutions available may give you a better return on investment as your needs change.<\/p>\n<p>Research what\u2019s noteworthy about the vendor. What\u2019s their image and reputation? What do they specialize in? How transparent are they? How much of their work is investment in research and development?<\/p>\n<p>This three-step approach will help you evaluate your endpoint security options with clarity in a confusing market. You\u2019ll come to understand exactly what your organization needs, what the experts (and everyday users) say about the solutions and the potential of vendors to deliver overall value.<\/p>\n<p>Your choice is important. At this stage in your business growth, effective cybersecurity will make all the difference to your ability to protect your customers and outshine the competition. Good luck.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Endpoint protection must evolve with your business. As threats increase, your endpoint security solution should be working as hard as your team.<\/p>\n","protected":false},"author":2600,"featured_media":35768,"template":"","coauthors":[3822],"class_list":{"0":"post-35748","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-endpoint-security","7":"emagazine-tag-white-paper"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/choosing-cybersecurity-vendor\/35748\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/35748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2600"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/35768"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=35748"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=35748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}