{"id":15369,"date":"2020-04-23T14:17:22","date_gmt":"2020-04-23T19:17:22","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=15369"},"modified":"2025-11-18T12:00:13","modified_gmt":"2025-11-18T17:00:13","slug":"what-is-edr","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/what-is-edr\/","title":{"rendered":"What is EDR? Automated Endpoint Detection &#038; Real-Time Response to Threats"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"15369\" class=\"elementor elementor-15369\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ca443e6 e-flex e-con-boxed e-con e-parent\" data-id=\"ca443e6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b6076a1 elementor-widget elementor-widget-text-editor\" data-id=\"b6076a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Continuing our theme of decoding abbreviations, EDR means Endpoint Detection &amp; Response, and the age of AI adoption is now mainstream. This automated, real-time <\/span><a href=\"https:\/\/www.firewalls.com\/blog\/top-5-network-security-solutions\/\"><span style=\"font-weight: 400;\">endpoint solution<\/span><\/a><span style=\"font-weight: 400;\"> ensures that end users can work securely, no matter where in the world they\u2019re located in relation to a firewall.<\/span><\/p><p><span style=\"font-weight: 400;\">With EDR, your network defenses constantly scan for the kinds of elusive malware, ransomware, and zero-day threats that signature-based detection platforms miss. In the event a security incident occurs, advanced Endpoint Detection &amp; Response platforms such as Sophos Intercept X Advanced with EDR,\u00a0 or FortiEDR, stop attacks even if the endpoint is compromised.<\/span><\/p><p><span style=\"font-weight: 400;\">EDR\u2019s machine learning systems deter, detect, disarm, dissect, de-escalate, and do away with any cyber threats you can throw its way. This is essential considering the growing threat landscape and the expanding endpoints across remote and hybrid work environments. This article aims to provide actionable answers to the question: What is EDR?<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cfc660 elementor-widget elementor-widget-heading\" data-id=\"4cfc660\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Why EDR Works for Small Businesses\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae04dba elementor-widget elementor-widget-text-editor\" data-id=\"ae04dba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">A majority of small businesses find it difficult to hire qualified IT talent, especially talent focused on network security. Second, their budgets often struggle to accommodate the talent they do find.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Automated endpoint detection and response monitored by 24-hour machine learning intelligence adds just the kind of cybersecurity expertise that SMBs need without a higher employee headcount. On top of that, you\u2019re getting remote security now that EDR is more than capable of protecting remote endpoints. When it comes to comparing on-staff network security and <\/span><a href=\"https:\/\/www.firewalls.com\/blog\/cloud-security-best-practices\/\"><span style=\"font-weight: 400;\">cloud licensing<\/span><\/a><span style=\"font-weight: 400;\">, it becomes obvious which ends up being more cost-efficient.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">It isn\u2019t just about the cost, as operational efficiencies are seen here as well. Automation enables small businesses to do more with less to get the job done. Give the malware expertise and incident response to automation, using it as your network security co-pilot.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50e824a elementor-widget elementor-widget-heading\" data-id=\"50e824a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1. Sophos Intercept X Advanced with EDR\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf10dd7 elementor-widget elementor-widget-text-editor\" data-id=\"bf10dd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">This Sophos security solution has been a longstanding go-to for network admins looking to add advanced protection to their networks. Sophos <\/span><a href=\"https:\/\/www.firewalls.com\/brands\/sophos\/central\/intercept-x-advanced.html\"><span style=\"font-weight: 400;\">Intercept X Advanced<\/span><\/a><span style=\"font-weight: 400;\"> also consolidates that industry-leading protection and EDR into a single solution.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This solution\u2019s advanced malware prevention significantly eases the workload on the EDR component. This allows you to utilize more of the speed and performance you pay your Internet Service Provider (ISP) for.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s a brief look at some of the leading benefits:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Minimize staffing by automating IT tasks usually done by skilled experts<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prioritize potential threats &amp; automatically detect security incidents<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Provide visibility into attack scope, root cause, impact, &amp; network health<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hunt for indicators of compromise that may leave your network vulnerable<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">While this is a leading solution in endpoint protection tools, it\u2019s far from your only options here. Fortinet\u2019s FortiEDR is just as relevant to this discussion.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9a355d elementor-widget elementor-widget-heading\" data-id=\"e9a355d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2. Fortinet FortiEDR\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94d516f elementor-widget elementor-widget-text-editor\" data-id=\"94d516f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">An EDR solution purpose-built to detect potential threats, <\/span><a href=\"https:\/\/www.firewalls.com\/catalogsearch\/result\/?q=FortiEDR\"><span style=\"font-weight: 400;\">Fortinet\u2019s FortiEDR<\/span><\/a><span style=\"font-weight: 400;\"> stops breaches in real time and mitigates the damage of ransomware even on machines that have already been compromised. FortiEDR also extends security to IOT devices with the ability to protect everything from PCs to servers to point-of-sale systems and more.<\/span><\/p><p><span style=\"font-weight: 400;\">This is part of what sets FortiEDR apart from other options:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Creates a very small network footprint thanks to native cloud infrastructure<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enjoy automated EPP with orchestrated response across platforms<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Stop file-based malware with Fortinet\u2019s kernel-level Next Gen AV engine<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Eliminate dwell time &amp; reduce post-breach expenses<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">You can\u2019t consider EDR without taking a look at what SonicWall brings to the table. In this case, we\u2019re taking a look at their Capture Client, a leading option for network defense strategies regarding endpoints.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-baef5d4 elementor-widget elementor-widget-heading\" data-id=\"baef5d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3. SonicWall Capture Client\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c309d1 elementor-widget elementor-widget-text-editor\" data-id=\"3c309d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Automated endpoint detection &amp; response is a part of <\/span><a href=\"https:\/\/www.firewalls.com\/brands\/sonicwall\/capture-client.html\"><span style=\"font-weight: 400;\">SonicWall\u2019s Capture Client<\/span><\/a><span style=\"font-weight: 400;\">, bringing together EDR, advanced threat protection, and integrated network security. Capture Client offers unique ransomware rollback capabilities and intuitive attack visualizations. Additionally, Capture Client offers a comprehensive endpoint protection and EDR environment for any SonicWall network.<\/span><\/p><p><span style=\"font-weight: 400;\">The details below are what make this option such a standout solution:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Next-generation SentinelOne malware protection engine<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Advanced threat protection with sandbox integration<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Behavior-based scanning powered by machine learning<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Unique attack rollback capabilities to support threat removal policies<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Install &amp; manage trusted TLS certificates to leverage DPI-SSL<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">All of these network security providers have something to offer here. Then again, it\u2019s also about finding the best <\/span><a href=\"https:\/\/www.firewalls.com\/blog\/endpoint-security-explained\/\"><span style=\"font-weight: 400;\">endpoint detection<\/span><\/a><span style=\"font-weight: 400;\"> and response solution for your business.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30945b9 elementor-widget elementor-widget-heading\" data-id=\"30945b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Let\u2019s Wrap Up\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fc186b elementor-widget elementor-widget-text-editor\" data-id=\"1fc186b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">EDR provides real-time detection and automated response to malware, ransomware, zero-day threats, and many other evolving cyber threats. With benefits like machine learning, cost efficiency, and a scalable solution for remote environments, modern EDR is a must.<\/span><\/p><p><span style=\"font-weight: 400;\">Of course, finding the best EDR solution comes down to your specific network security demands. Get in touch <\/span><a href=\"https:\/\/www.firewalls.com\/contact\"><span style=\"font-weight: 400;\">with our team<\/span><\/a><span style=\"font-weight: 400;\"> here at Firewalls, and we\u2019ll walk you through the best endpoint detection and response tools for your exact needs.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28795fb elementor-widget elementor-widget-button\" data-id=\"28795fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"tel:3172254117\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Call Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d9dfcff e-flex e-con-boxed e-con e-parent\" data-id=\"d9dfcff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-67566ca elementor-widget elementor-widget-heading\" data-id=\"67566ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQ<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a72fbd3 elementor-widget elementor-widget-heading\" data-id=\"a72fbd3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What is XDR vs EDR?\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23536a5 elementor-widget elementor-widget-text-editor\" data-id=\"23536a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">XDR can be looked at as an expansion of EDR by correlating data across multiple security layers. This includes endpoints, network servers, cloud workloads, and more. While EDR, on the other hand, focuses primarily on endpoint-specific threats.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8939d68 elementor-widget elementor-widget-heading\" data-id=\"8939d68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What is EDR and Why is it Important for Businesses?\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e13c77 elementor-widget elementor-widget-text-editor\" data-id=\"7e13c77\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">EDR monitors endpoints in real-time, detects threats, and responds to attacks automatically. This works to protect both on-site and remote devices alike.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64cd6dd elementor-widget elementor-widget-heading\" data-id=\"64cd6dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How Does EDR Help Small Businesses with Limited IT Resources?\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c60390f elementor-widget elementor-widget-text-editor\" data-id=\"c60390f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">This is a core part of network defense strategies, promising automated monitoring and threat response. In turn, small businesses get enterprise-level protection without needing a large IT team.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Get a breakdown of endpoint protection tools, how they differ, and why they\u2019re important to answer the common question: What is EDR?<\/p>\n","protected":false},"author":5,"featured_media":26827,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[286,610],"tags":[],"class_list":["post-15369","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-end-user-protection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is EDR? A Look at Multiple Network Solutions - Firewalls.com<\/title>\n<meta name=\"description\" content=\"Get a breakdown of endpoint protection tools, how they differ, and why they\u2019re important to answer the common question: What is EDR?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/what-is-edr\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is EDR? A Look at Multiple Network Solutions - Firewalls.com\" \/>\n<meta property=\"og:description\" content=\"Get a breakdown of endpoint protection tools, how they differ, and why they\u2019re important to answer the common question: What is EDR?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/what-is-edr\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-23T19:17:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T17:00:13+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-is-EDR_-Automated-Endpoint-Detection-Real-Time-Response-to-Threats.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-edr\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-edr\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"What is EDR? Automated Endpoint Detection &#038; Real-Time Response to Threats\",\"datePublished\":\"2020-04-23T19:17:22+00:00\",\"dateModified\":\"2025-11-18T17:00:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-edr\/\"},\"wordCount\":928,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-edr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-is-EDR_-Automated-Endpoint-Detection-Real-Time-Response-to-Threats.png\",\"articleSection\":[\"Cybersecurity\",\"End User Protection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.firewalls.com\/blog\/what-is-edr\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-edr\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/what-is-edr\/\",\"name\":\"What is EDR? A Look at Multiple Network Solutions - Firewalls.com\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-edr\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-edr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-is-EDR_-Automated-Endpoint-Detection-Real-Time-Response-to-Threats.png\",\"datePublished\":\"2020-04-23T19:17:22+00:00\",\"dateModified\":\"2025-11-18T17:00:13+00:00\",\"description\":\"Get a breakdown of endpoint protection tools, how they differ, and why they\u2019re important to answer the common question: What is EDR?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-edr\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.firewalls.com\/blog\/what-is-edr\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-edr\/#primaryimage\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-is-EDR_-Automated-Endpoint-Detection-Real-Time-Response-to-Threats.png\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-is-EDR_-Automated-Endpoint-Detection-Real-Time-Response-to-Threats.png\",\"width\":1120,\"height\":630,\"caption\":\"Automated Endpoint Detection & Response (EDR)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-edr\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.firewalls.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is EDR? Automated Endpoint Detection &#038; Real-Time Response to Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/firewallscom\",\"https:\/\/x.com\/firewallscom\",\"https:\/\/www.linkedin.com\/company-beta\/1439857\/\",\"https:\/\/www.youtube.com\/user\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\/\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is EDR? A Look at Multiple Network Solutions - Firewalls.com","description":"Get a breakdown of endpoint protection tools, how they differ, and why they\u2019re important to answer the common question: What is EDR?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/what-is-edr\/","og_locale":"en_US","og_type":"article","og_title":"What is EDR? A Look at Multiple Network Solutions - Firewalls.com","og_description":"Get a breakdown of endpoint protection tools, how they differ, and why they\u2019re important to answer the common question: What is EDR?","og_url":"https:\/\/www.firewalls.com\/blog\/what-is-edr\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2020-04-23T19:17:22+00:00","article_modified_time":"2025-11-18T17:00:13+00:00","og_image":[{"width":1120,"height":630,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-is-EDR_-Automated-Endpoint-Detection-Real-Time-Response-to-Threats.png","type":"image\/png"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/what-is-edr\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/what-is-edr\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"What is EDR? Automated Endpoint Detection &#038; Real-Time Response to Threats","datePublished":"2020-04-23T19:17:22+00:00","dateModified":"2025-11-18T17:00:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/what-is-edr\/"},"wordCount":928,"commentCount":0,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/what-is-edr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-is-EDR_-Automated-Endpoint-Detection-Real-Time-Response-to-Threats.png","articleSection":["Cybersecurity","End User Protection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.firewalls.com\/blog\/what-is-edr\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/what-is-edr\/","url":"https:\/\/www.firewalls.com\/blog\/what-is-edr\/","name":"What is EDR? A Look at Multiple Network Solutions - Firewalls.com","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/what-is-edr\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/what-is-edr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-is-EDR_-Automated-Endpoint-Detection-Real-Time-Response-to-Threats.png","datePublished":"2020-04-23T19:17:22+00:00","dateModified":"2025-11-18T17:00:13+00:00","description":"Get a breakdown of endpoint protection tools, how they differ, and why they\u2019re important to answer the common question: What is EDR?","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/what-is-edr\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/what-is-edr\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/what-is-edr\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-is-EDR_-Automated-Endpoint-Detection-Real-Time-Response-to-Threats.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-is-EDR_-Automated-Endpoint-Detection-Real-Time-Response-to-Threats.png","width":1120,"height":630,"caption":"Automated Endpoint Detection & Response (EDR)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/what-is-edr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is EDR? Automated Endpoint Detection &#038; Real-Time Response to Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=15369"}],"version-history":[{"count":26,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15369\/revisions"}],"predecessor-version":[{"id":26828,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15369\/revisions\/26828"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/26827"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=15369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=15369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=15369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}