Not used
Misconfiguration risk
Not used
Device vulnerability risk
Risk via external storage media
HFW setting mistake
Lack of understanding of devices and software to be managed
Unable to analyze intruded malware
There are threats that traditional antivirus cannot detect
I am having trouble with over-detection and false detection.
There are threats that EDR cannot detect
Trouble with tuning and maintenance work
Device vulnerability risk
Risk via external storage media
HFW setting mistake
Not used
Not used
Device vulnerability risk
Risk via external storage media
HFW setting mistake
Inability to collect attack information
Click for risk explanation video







[Regarding your environment] * Single-byte numeric input
Please tell me the number of terminals used on the internal network (headquarters)
| client | platform | |
| server | platform |
Please tell me the number of terminals used on the internal network (branch offices, branches, etc.)
| client | platform | |
| server | platform |
Please let me know the usage status of the terminal on the cloud (AWS/Azure/GCP, etc.)
[About security measures]
What are your endpoint security requirements?
Please tell us about the status of support for asset visualization.
| product name: | ||
Have you installed a malware analysis platform?
| product name: |
Are you gathering security intelligence?
| product name: |
*Please answer the unanswered questions (red).
* Diagnosis cannot be performed unless there is at least one terminal at the head office or branch office.
Press "Diagnose" and the results will be displayed here
To reproduce the previous diagnosis, enter the diagnostic key below and press the reproduce button.
[Diagnosis key]
Thank you for your answer
Since the customer's environment is before AV measures, how about starting with the introduction of antivirus first?
The customer's environment is a defense system centered on AV,
The customer's environment is a defense system centered on AV / EDR,
It seemed that there was a difference in the response status of each base.
Infringements across bases have also been reported as incidents, so please consider standardizing countermeasures between bases.
The same was true for the response status of each site.
"The first step in endpoint security is the introduction of NGAV"
"The first step toward EDR countermeasures is to replace with NGAV"
In the case of customer environments, we recommend that measures begin with the introduction of NGAV.
Considering the operating costs that are not directly included in the product cost, such as the presence or absence of an antivirus-related management server and the time and effort required to update signature files, how about considering a move that can serve as a basis for EDR considerations from the next fiscal year onwards? Is not it?
Build a state-of-the-art threat posture with logic against unknown malware and threats, including behavioral detection and machine learning detection.
Click here for more information on CrowdStrike Falcon
CrowdStrike Falcon Features and Advantages
What companies need now is state-of-the-art NGAV that goes beyond detection and defense
“Real-time performance is essential for EDR that responds to the latest threats.”
We recommend you to accurately understand the merits and demerits of each EDR product based on the customer's requirements and the introduction status of each product, and to consider the introduction after verification.
Build a system that can respond to the latest threats with or without detection logic for unknown malware and threats, such as behavior detection and machine learning detection logic.
With EDR, it is important to judge whether the product is capable of countering attacks that are similar to actual targeted attacks, from the perspective of whether detailed information linked to detection can be comprehensively confirmed. In addition, in order to respond to the rapid development of such attacks, the ability to collect logs in real time is essential. Also, build a secure environment with EDR, which has a hunting function, to capture threats using standard tools.
Click here for more information on CrowdStrike Falcon
CrowdStrike Falcon Features and Advantages
What is a next-generation endpoint platform that protects companies from diverse work styles?
"Comprehensive endpoint security with a single agent"
We recommend that you consider the EDR product from the perspective of whether it can be used as an endpoint platform based on your requirements and the status of each product's introduction.
Build a state-of-the-art threat posture with logic against unknown malware and threats, including behavioral detection and machine learning detection.
With EDR, it is important to judge whether the product is capable of countering attacks that are similar to actual targeted attacks, from the perspective of whether detailed information linked to detection can be comprehensively confirmed. In addition, in order to respond to the rapid development of such attacks, the ability to collect logs in real time is essential. Also, build a secure environment with EDR, which has a hunting function, to capture threats using standard tools.
We cannot overlook the burden on users due to the coexistence of various products, such as asset management products and vulnerability management products that are currently being used on endpoints, and the cost of mastering the separate consoles of target products on the administrator side. part. By using an integrated platform, you can reduce various costs in the medium to long term.
Click here for more information on CrowdStrike Falcon



