2022-06-17T07:03:00Z

Do we need to use both EDR and Antivirus (AV) solutions for better protection of IT assets?

Hello all,

An anti-virus (AV) works based on the file signature mechanism and an Endpoint Detection and Response (EDR) tool is behavior-based. 

Do we need to use both EDR and AV solutions or EDR-only to protect our IT assets?

 Thanks.

reviewer1740369 - PeerSpot reviewer
User at Jkumar infra
  • 8
  • 990
8
PeerSpot user
8 Answers
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Real User
ExpertModerator
2022-06-19T06:47:36Z
Jun 19, 2022

Hi @reviewer1740369​,


When evaluating EDR vs. antivirus, it’s important to note that an Endpoint Detection and Response solution does all that the best antivirus product does – and more. Typically it is recommended other antivirus tools be removed when an EDR solution is installed. 


Running both can cause slowness or other technical issues on systems and devices. To defend against complex and evolving threats, the choice is clear – Endpoint Detection and Response will give you more advanced security.

Search for a product comparison in IT Asset Management
CP
Partner Account Manager 🔆 at SEC DataCom A/S
Reseller
Top 20
2022-06-24T07:27:29Z
Jun 24, 2022

The short answer is no. EDR includes EPP (EndPoint Protection) which is more advanced that antivirus and detects zero-day threats, malicious behaviour and much more. 


Also, products like SentinelOne make Incident Response and threat hunting so much easier because they track and record all the relevant events happened during an attack.

Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Real User
ExpertModerator
2022-06-19T06:51:17Z
Jun 19, 2022

Hi @reviewer1740369​,


Hope this will be helpful when you have to take a call for exact differences.


EDR Features:
1. EDR includes real-time monitoring and detection of threats – including those that may not be easily recognized or defined by standard antivirus. Also, EDR is behavior-based, so it can detect unknown threats based on a behavior that isn’t normal.


2. Data collection and analysis determine threat patterns and alerts organizations to threats


3. Forensic capabilities can assist in determining what has happened during a security event


4. EDR can isolate and quarantine suspicious or infected items. It often uses sandboxing to ensure a file’s safety without disrupting the user’s system.


5. EDR can include automated remediation or removal of certain threats


Antivirus Features:


1. Antivirus is signature-based, so it only recognizes threats that are known.


2. AV can include scheduled or regular scanning of protected devices to detect known threats


3. Assists in the removal of more basic viruses (worms, trojans, malware, adware, spyware, etc.)


4. Warnings about possibly malicious sites

Jairo Willian Pereira - PeerSpot reviewer
Information Security Manager at a retailer with 10,001+ employees
Real User
Top 5Leaderboard
2022-08-05T18:53:35Z
Aug 5, 2022

´til now, both. EDR technology is moving to XDR but is on "peak of inflated expectations", the second of five phases in product development hype (Gartner). I'd rather wait a little bit, may be ZDR :)

Kevin Mabry - PeerSpot reviewer
Regulatory Compliance Services - Small Business Regulatory Compliance Services at Sentree Systems, Corp.
Reseller
Top 5
2022-06-27T05:06:11Z
Jun 27, 2022

Hi, 


No, you don't need both because EDR is an advanced Antivirus with behavior-based analysis. 


Unless you have a whole team that is able to determine and parse the data, you might even consider an MDR (Managed Detection & Response).  MDRs have a team watching the alerts. They monitor the device logs and, if it is advanced enough, they will also monitor your firewall traffic as well.

Navcharan Singh - PeerSpot reviewer
Senior Seo Executive at Ace Cloud Hosting
Consultant
Top 5
2022-12-15T04:54:15Z
Dec 15, 2022

There is a lot of discussion on this topic, and opinions vary. Some people believe that using both an EDR solution and an AV solution is the best way to protect your computer, while others believe that using one or the other is sufficient.


The truth is that there is no one right answer. The best way to protect your computer is to use a combination of both EDR and AV solutions, as this will provide the most comprehensive protection. However, if you are only able to use one or the other, then it is better to use an EDR solution rather than an antivirus.

Learn what your peers think about IFS Applications. Get advice and tips from experienced pros sharing their opinions. Updated: May 2023.
710,326 professionals have used our research since 2012.
Remy Ma - PeerSpot reviewer
Network Security Services at ACE Managed Securty Services
Real User
Top 5
2022-12-13T04:23:45Z
Dec 13, 2022

It depends on your organization's security posture. A multi-layered security approach is always best and should include EDR vs antivirus solutions. Additional layers might include a firewall, intrusion detection/prevention system (IDS/IPS), email security, and web filtering.


EDR solutions use rules-based detection to identify malicious or unauthorized activity. This type of detection is very effective at identifying attacks that have bypassed traditional AV solutions. EDR solutions can also help you quickly identify and respond to incidents, improve your visibility into what's happening on your network, and help you optimize your security resources.

CA
Product Manager at a comms service provider with 51-200 employees
Real User
Top 5
2022-06-24T13:45:19Z
Jun 24, 2022

These two solutions are more like complementary tools. 


However, if you "really" have a security team that works 24/7, then you might not need an AV but this team should be really competent. Otherwise, it won't produce the result you're expecting.

Related Questions
EB
Director of Community at PeerSpot (formerly IT Central Station)
Nov 17, 2022
Hi dear professionals, What are the main benefits and use cases of a modern IT Asset Discovery tool? Any particular advantages and use cases for cloud/hyper-cloud environments? Thanks for sharing your knowledge with the community
2 out of 5 answers
Jairo Willian Pereira - PeerSpot reviewer
Information Security Manager at a retailer with 10,001+ employees
Feb 1, 2022
Real-time and reliable inventory/CMDB (that can help entire company and others IT Governance domains to validade a trustworthy environment).
CT
Product Manager at a tech services company with 501-1,000 employees
Feb 2, 2022
CMDB supported by a discovery tool can keep the service model of the IT operation management updated. This will help the root cause analysis to be made easier. 
Ariel Lindenfeld - PeerSpot reviewer
Director of Community at PeerSpot
Feb 3, 2022
Let the community know what you think. Share your opinions now!
2 out of 3 answers
HR
User at University of Hawaii
Oct 6, 2021
Product support to our wide range of devices, access to KB, support team to ensure a smooth implementation on our environment and thru the life of the system. 
ER
Senior Engineer DCMT at a financial services firm with 5,001-10,000 employees
Dec 16, 2021
Great product support team to ensure a smooth process when implementing and troubleshooting in the early stages.  User-friendliness of the software is also important, as we have a wide range of people who use it.
Related Articles
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Aug 14, 2021
Future of ITSM: Trends and Predictions At the beginning of 2020, we made some predictions about the future of ITSM. Of course, there are some things that no one could have ever predicted this year – for example, there was no way to predict the global pandemic and the rapid-fire adoption of digital transformation that followed. However, these often-intense changes, have created a bright futur...
TS
CEO at Rufusforyou
Dec 15, 2022
Security and protecting your IT environment is the biggest challenge now.  How to prevent ransomware attacks? Part 1 described our approach to proactively protect your environment. The first step is to scan your environment from server to endpoint and check your complete environment on several issues preventing a hacker to penetrate your systems. Most of the times hackers getting a chance bec...
See 1 comment
Navcharan Singh - PeerSpot reviewer
Senior Seo Executive at Ace Cloud Hosting
Dec 15, 2022
There are a number of discovery tools and security applications on the market today. Some of the more popular ones include: - App discovery: Appthority, FindMyApp - Email discovery: Code Factors, Microsoft Exchange Reporter, ProDiscover TX, SolarWinds MSP Mail Security - Network discovery: BeyondTrust PowerBroker Auditor for Networks, Lancope StealthWatch Enterprise, NetFort LANGuardian - Security information and event management (SIEM): AlienVault USM Anywhere, ArcSight ESM, IBM QRadar SIEM
Related Articles
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Aug 14, 2021
Future of ITSM: Trends and Predictions
Future of ITSM: Trends and Predictions At the beginning of 2020, we made some predictions abou...
TS
CEO at Rufusforyou
Dec 15, 2022
Discovery tools & security - Part 2
Security and protecting your IT environment is the biggest challenge now.  How to prevent ransom...
Download Free Report
Download our free IFS Applications Report and get advice and tips from experienced pros sharing their opinions. Updated: May 2023.
DOWNLOAD NOW
710,326 professionals have used our research since 2012.