Endpoint Detection & Response (EDR) , Endpoint Security , Next-Generation Technologies & Secure Development

Managing Endpoints With the Right EDR Strategy

ManageEngine Expert Shares Why Organizations Still Struggle With Endpoints
Romanus Prabhu Raymond, director of product support, ManageEngine

EDR has been in existence for years, but many organizations still fail to address known vulnerabilities, and struggle with how to create a solid endpoint security strategy, said Romanus Prabhu Raymond, director of product support at ManageEngine.

See Also: Security Megatrends and Their Impact on Endpoint Security

"There is a challenge in understanding the availability of endpoint, exposure of the endpoint to attackers, and you should be able to do the patching on time," said Raymond. "This is where the organizations are struggling the most. Once you are able to do this, building upon it will be easy."

In this video interview conducted at Information Security Media Group's Bengaluru Cybersecurity Summit, Raymond also discusses:

  • How the EDR market has evolved;
  • Why EDR is foundational to a successful XDR strategy;
  • Where adversaries are exploiting gaps in EDR.

Raymond leads product support for endpoint management at ManageEngine, a division of Zoho Corp. He has nearly 20 years of experience across legacy client management, modern endpoint management and security solution domains.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.