Trial lock

This Research is for Members Only

Not a member? Unlock a free sample of our research now!

Already a member?

Sign in now

Security icon

Select and Implement a Next Generation Endpoint Protection Solution

Today’s security battles are fought at the endpoint.

Unlock Sample Research

View Storyboard

Solution Set Storyboard Thumbnail

Contributors

  • Absolute
  • Bromium
  • Carbon Black
  • CheckPoint
  • CrowdStrike
  • Cylance
  • Digital Guardian
  • McAfee
  • Malwarebytes
  • Sophos
  • Symantec
  • TrendMicro
  • Morphisec
  • SparkCognition

Your Challenge

  • As the market evolves, capabilities that were once cutting edge become default and new functionality becomes differentiating.
  • Vendors use a lot of marketing jargon, buzzwords, and statistics to sell their solutions, making objective evaluation rather difficult.
  • The endpoint protection (EPP) market is overcrowded and fragmented, resulting in information overload and consequently, a difficult vendor assessment.
  • Disparate product solutions are being bundled into one-off solutions or suites, often resulting in less efficient solutions than the more niche players.
  • Imminent obsolescence is an issue. Previous EPP solutions have not adapted with the rapidly evolving threat landscape and are no longer relevant, resulting in breaches or vulnerabilities.

Our Advice

Critical Insight

  • Don’t let vendors and market reports define your endpoint protection needs. Identify the use cases and corresponding feature sets that best align with your risk profile before evaluating the vendor marketspace.
  • Your security controls are diminishing in value (if they haven’t already). Develop a strategy that accounts for the rapid evolution and imminent obsolescence of your endpoint controls. Plan for future needs when making purchasing decisions today.
  • Endpoint protection is a matter of defense in depth and risk modelling, there is no silver bullet protection and mitigation solution. As end-client-technology providers release regular product/software updates, security tools will become outdated. Multiyear endpoint protection commitments will leave you playing a constant game of catch up.

Impact and Result

  • The solution is a holistic internal security assessment that not only identifies, but satisfies, your desired endpoint protection feature set with the corresponding endpoint protection suite and a comprehensive implementation strategy.
  • Use this blueprint to walk through the steps of selecting and implementing an endpoint protection solution that best aligns with your organizational needs.

Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should select and implement a next-generation endpoint protection solution, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

1. Create an effective endpoint protection strategy

Assess the use case and corresponding feature set that best aligns with the organizational landscape.

Guided Implementations

This guided implementation is a seven call advisory process.

Guided Implementation #1 - Create an endpoint protection strategy

Call #1 - Identify the need for an EPP solution.
Call #2 - Identify the most appropriate use case.

Guided Implementation #2 - Select your endpoint protection solution

Call #1 - Understand the EPP vendor landscape.
Call #2 - Shortlist the vendors and create an RFP
Call #3 - Score RFP responses and review contracts.

Guided Implementation #3 - Implement and manage your endpoint protection solution

Call #1 - Plan and launch the implementation.
Call #2 - Finalize success metrics.

Onsite Workshop

Unlock Sample Research

Book Your Workshop

Onsite workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost onsite delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

Module 1: Create An Effective Endpoint Protection Strategy

The Purpose

  • Assess the use case and corresponding feature set that best aligns with your organizational landscape.

Key Benefits Achieved

  • Determine why you need a new endpoint protection solution.
  • Understand Info-Tech’s use-case approach.
  • Evaluate current endpoint protection feature sets and criteria.

Activities

Outputs

1.1

Determine if an EPP solution is right for you.

  • Understanding of current EPP situation.
1.2

Identify your unique use-case scenario.

  • The most appropriate use-case scenario to structure your evaluation around.
1.3

Evaluate the EPP feature sets.

  • Shortlisted feature sets that best align with your organizational use case.

Module 2: Select an Endpoint Protection Solution

The Purpose

  • Streamline your endpoint procurement process by identifying the vendor that best satisfies your use-case criteria.

Key Benefits Achieved

  • Optimize your endpoint protection procurement process.
  • Determine EPP vendor criteria.
  • Evaluate the EPP marketspace.
  • Design, submit, and evaluate vendor RFPs.

Activities

Outputs

2.1

Analyze the vendor landscape.

  • Detailed understanding of the vendor landscape.
2.2

Create a custom vendor shortlist.

  • Shortlist of suitable solutions.
2.3

Develop an RFP.

  • Completed and reviewed RFP document.
2.4

Standardize a vendor demo script.

  • Fairly evaluated vendor demos.
2.5

Assess the total cost of ownership and return on investment of each solution.

  • Side-by-side comparison of TCO and ROI.

Module 3: Implement and Manage Your Endpoint Protection Solution

The Purpose

  • Prepare for the EPP implementation and measure the value of the solution.

Key Benefits Achieved

  • Identify the appropriate resourcing plan for your endpoint protection solution.
  • Plan the implementation.
  • Design, build, test, and roll out the solution.
  • Develop a comprehensive measurement program.

Activities

Outputs

3.1

Plan for your implementation.

  • Clearly defined responsibilities and a structured project roadmap
3.2

Evaluate the success of your endpoint implementation.

  • A shortlist of relevant endpoint protection metrics

Member Testimonials

Unlock Sample Research

After each Info-Tech experience, we ask our members to quantify the real time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this Blueprint, and what our clients have to say.

Client

Experience

Impact

$ Saved

Days Saved

Proquest

Guided Implementation

10/10

N/A

5

Hope Global

Guided Implementation

10/10

$13,236

10

Roivant

Guided Implementation

10/10

N/A

N/A

St. Joseph's Healthcare Hamilton

Guided Implementation

9/10

$3,000

2

St. Lawrence County

Guided Implementation

10/10

$33,091

5

Ottawa Community Housing Corporation

Guided Implementation

9/10

$16,000

20

City of Woodbury

Guided Implementation

9/10

$13,236

2

American Nutrition, Inc.

Guided Implementation

10/10

N/A

N/A

Morningstar Air Express

Guided Implementation

9/10

$2,000

5

ISG Central Services Ltd.

Guided Implementation

8/10

N/A

N/A

Research Triangle Institute

Guided Implementation

8/10

N/A

N/A

City of Woodbury

Guided Implementation

10/10

$21,178

10

Blue Earth County Government

Guided Implementation

9/10

$5,294

5

Care New England Health System

Guided Implementation

9/10

$13,236

10

Washington State Department of Ecology

Guided Implementation

10/10

$2,647

100

Analysis Group Inc

Guided Implementation

9/10

N/A

N/A

CAA South Central Ontario Systems and Services Inc.

Guided Implementation

10/10

$25,000

29

Chemeketa Community College

Guided Implementation

9/10

N/A

N/A

Basin Electric Power Cooperative

Guided Implementation

9/10

$13,236

20

SAF- Holland

Guided Implementation

6/10

$6,618

15

City of Los Angeles Recreation and Parks

Guided Implementation

8/10

$14,295

30

Washington State Department of Ecology

Guided Implementation

10/10

$330K

90

Volaris Group

Guided Implementation

8/10

$10,000

15

International Civil Aviation Organization

Guided Implementation

6/10

N/A

N/A