Category: Endpoint Detection and Response (EDR)

Delve into our guides on Endpoint Detection and Response to see how EDR tools help detect, investigate, and respond to threats on endpoints. Understand the capabilities of EDR systems in preventing potential security incidents.

July 16, 2024

Datto’s EDR and AV Solutions Secure 99.62% Malware Detection Efficacy in Miercom’s Study

Marketing

Discover how Datto’s EDR and AV solutions achieved a 99.62% malware detection efficacy in Miercom’s independent study, surpassing industry averages.

Read Now
July 11, 2023

Ransomware Rollback Now Included With Datto Endpoint Detection and Response

Chris McKie

New ability recovers files typically lost to ransomware attacks.

Read Now
November 16, 2022

What is Datto EDR? Why MSPs Need Endpoint Detection and Response

David Weiss

While installing antivirus (AV) on each endpoint used to be sufficient, advanced endpoint threat detection and response (EDR) is now a must to better protect against costly attacks.

Read Now
May 28, 2022

What Is Endpoint Detection and Response (EDR)?

George Rouse

Endpoint detection and response is a layered, integrated endpoint security solution that monitors end-user devices continuously in addition to collecting endpoint data with a rule-based automated response.

Read Now
February 28, 2022

10 Considerations Before Buying an Endpoint Detection and Response (EDR) Security Solution – Part 2

Elizabeth Fichtner

Part two of a two-part blog series exploring important considerations when purchasing an endpoint detection and response (EDR) security solution or EDR tool for your organization.

Read Now
February 25, 2022

10 Considerations Before Buying an Endpoint Detection and Response (EDR) Security Solution – Part 1

Elizabeth Fichtner

Part one of a two-part blog series exploring important considerations when purchasing an endpoint detection and response (EDR) security solution or EDR tool for your organization.

Read Now
February 09, 2015

5 Workstation Security Best Practices

John DeWolf

The following five practices can help prevent possible problems and increase the security of your workstation.

Read Now