Endpoint Protection and Utilization of E5 Features: - Do you use Microsoft Defender EDR for Endpoint EDR? If not, what product do you use (e.g., CrowdStrike, SentinelOne, CarbonBlack)? - If you have Microsoft E5 licenses, are you utilizing all features as your primary and only solution for each domain (e.g., Endpoint protection, Information protection, vulnerability management)? Or do you have other solutions in place either alongside or in place of the included capabilities in E3/E5?

1k views3 Comments
Sort By:
Oldest
Director of IT in Services (non-Government)3 months ago
Hello,
Couple of quick comments, happy to get on a call if you want to talk more thoroughly. 
-- We have a MSFT E5 and use InTune for MDM and endpoint protection (antivirus/malware), Cloud Application security to restrict web browsing, and Defender for vulnerability management.
-- In addition to Defender, we also use NESSUS for a layered approach.
-- We use SUMO Logic for logging endpoint activity in addition to MSFT Defender.
-- We use Thycotic for prevention of application execution at endpoints. This helps us block any data exfiltration applications from running.

-- We do not license SentinelOne in addition to the E5.
-- We are using OKTA for identity services, but are looking into switching to MSFT Identity Services since it's in the E5 and coming along in capability.

This tool set is a good balance of features and cost and makes sense for us since our devices are generally not exposed to PII, PHI, PCI, or financial data. If our business needed a top tier security stance, we would reassess our technology and perhaps make some changes.
1
Director of IT3 months ago
We do not use E5 licensing.  We use E3 and Crowdstrike
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
CISO in Insurance (except health)3 months ago
We do have E5 licensing but use Crowdstrike as an EDR. 

Content you might like

Director of IT in IT Services4 days ago
Implementation of Zero trust architecture, its modules across the organisation is a priority for us. So, we will be implementing zero trust strategies in IAM, inline with overall strategy.
1.4k views1 Comment

Human Factors (fears, mental health, physical spacing)85%

Technical / IT Factors (on-premise tools, pivoting back away from remote)14%

3.7k views3 Upvotes2 Comments