I do not think this is an apples-to-apples comparison and am not finding much information about it.
I work as a Senior Finance Manager at a Healthcare company. I am being asked to provide a comparison document for these 2 products (BeyondTrust Endpoint Privilege Management and Microsoft Defender) which is difficult because they are such different solutions.
Can anyone help?...
There are many cybersecurity tools available, but some aren't doing the job that they should be doing.
What are some of the threats that may be associated with using 'fake' cybersecurity tools?
What can people do to ensure that they're using a tool that actually does what it says it does?
You should build a lab, try the tools and analyze the traffic and behavior with a traffic analizer like wireshark and any sandbox or edr that shows you what the tools do, but all this should be outside your production environment, use tools that has been released by the company provider and not third party downloads or unknown or untrusted sources.
Senior Manager at a financial services firm with 10,001+ employees
07 January 21
One should 1st have details understanding of what he/she is looking to protect within environment as tool are specially designed for point solution. Single tool will not able to secure complete environment and you should not procure any solution without performing POC within your environment
As there is possibility that tool which works for your peer organisation does not work in similar way for yours as each organisation has different components and workload/use case