📊 Our 2025 Cyber Claims Report is out now!
Skip To Main Content
Cyber Incident? Get Help
Blog homeCyber InsuranceSecurityExecutive RisksBroker EducationLife at Coalition

Not All Endpoint Security Solutions Are Created Equal

Person > Jason Vitale
Jason VitaleJune 28, 2025
Share:
Not All Endpoint Security Solutions Are Created Equal

Endpoint security solutions are becoming an increasingly popular way to fight back against mounting cyber threats. More than 40,000 critical vulnerabilities were published in 2024 alone, according to Coalition’s Cyber Threat Index 2025, and another 45,000-plus are expected this year.

The tools and services once primarily reserved for large-scale operations with deep pockets are now widely available to small and midsized businesses (SMBs) at a more affordable rate. Yet, as more businesses adopt these products, a clear disconnect has emerged between how they’re marketed and how they truly function.

Many businesses often assume they can buy any brand or version, install it, and immediately be more secure. But in reality, not all endpoint security solutions are created equal.

With the increased adoption rate of these tools and services, Coalition Incident Response (CIR)* has observed an uptick in cases in which cyber attacks impact businesses with endpoint security in place, most often due to misconfiguration, inadequate permissions granted, or misinterpretation of what they purchased.

Below, we’ll explore what’s exacerbating this problem, common issues with endpoint security solutions, and what to look for when purchasing a new product or service.

Knowing the difference: EDR vs XDR vs MDR

While these endpoint security solutions can vary greatly, here’s a high-level way to think about them:

  • Endpoint detection and response (EDR) is a baseline security tool that continuously monitors and protects physical devices connected to your business network, such as computers, mobile devices, and servers.

  • Extended detection and response (XDR) is an enhanced security tool that goes beyond endpoint devices to protect additional layers in your security stack, like internet of things (IoT) devices and applications.

  • Managed detection and response (MDR) is a managed security service that combines EDR or XDR with 24/7 human expertise to deliver proactive threat hunting and respond to threats in real time.

Understanding the differences between each is critical when determining what’s right for your business, especially because these products may also have different licenses or tiering systems. 

Many businesses often assume they can buy any brand or version, install it, and immediately be more secure. But in reality, not all endpoint security solutions are created equal.

For example, many out-of-the-box EDR tools are intentionally basic. They typically require a significant amount of configuration, incentivizing businesses to purchase additional licenses or higher-tiered products. Similarly, purchasing an MDR service doesn’t automatically mean you have the support of a dedicated team that’s watching your business like a security operations center (SOC).

CIR has encountered many businesses and managed service providers (MSPs) that believe a “team” is monitoring their networks when, in reality, these teams not only have dozens of other tasks but also primarily do IT work.

Who’s responsible for EDR configuration?

Time and again, we see businesses that may not fully comprehend the endpoint security solution they’ve purchased. 

CIR recently handled a case in which a business was using an EDR tool that provided very few alerts. The internal team tasked with monitoring alerts noticed something suspicious and requested logs from the EDR provider. However, before the business could investigate the matter, it experienced a full-blown ransomware attack.

After the attack, CIR examined the business’ network and was immediately able to identify the malicious file, raising the question of why it went undetected by the EDR tool.

Cases like these prompt conversations around how the EDR tool was configured. Technology providers typically assert that, if suspicious activity goes undetected, the blame lies with whomever configured the tool. 

Who’s tasked with responding to alerts?

Businesses that recognize the need for a managed service can still be left holding the bag if they haven’t procured the proper licenses.

CIR has seen multiple instances in which businesses have purchased an EDR tool but only have the licenses for it to operate “alert mode.” This means the EDR tool observed the occurrences of possible exploitation and escalated the alerts to the businesses; but it didn't have permission to automatically isolate or take action on the business’ behalf. Ultimately, each of these instances resulted in a full-fledged encryption event.

In every case, the business was hit with a different ransomware variant. They all had networks of different sizes and worked with different MSPs. The only commonality was the EDR provider.

Technology providers typically assert that, if suspicious activity goes undetected, the blame lies with whomever configured the tool. 

Who’s to blame for the communication breakdown?

The easy answer is to blame the technology providers. Some EDR tools could do a much better job of blocking out of the box. Others do too much whitelisting, logging a minimal amount of data if the customer isn’t paying for additional tiers of service that include MDR.

MSPs are another common scapegoat. We regularly encounter businesses surprised to learn that MSPs have either not configured or misconfigured their EDR tools and failed to carry out their contractual obligations.

However, businesses must accept responsibility for their roles in these cases, too.

The truth is that many EDR and XDR products don't just work out of the box; the onus is on the business to ensure its endpoint security tool has been configured correctly. And if you’re paying for an MDR service, it’s your job to grant the MDR provider enough power to take action.

Otherwise, what’s the point of managed service and response?

The truth is that many EDR and XDR products don't just work out of the box; the onus is on the business to ensure its endpoint security tool has been configured correctly.

4 simple questions to ask when assessing endpoint security tools

Businesses can assume more responsibility by thinking through these common missteps and asking questions like: 

  1. Do I understand the security afforded by the product or service I’m purchasing?

  2. Does the tier or license of my purchase match my business’ needs?

  3. Does my MDR service provider have enough authority to take action as needed?

  4. Can I run a tabletop exercise to determine if my security products are configured properly and if the tools and services meet my expectations?

Technology providers companies presume that you, as a buyer of these products and services, are making well-informed decisions and have the resources to respond to the events appropriately. And the product tiers reflect that understanding. This is how security alerts go unnoticed or unaddressed and end up resulting in cyber attacks.

Vimeo > Activate > MDR > Joe Toomey

Why MDR is a superior choice for SMBs

The rising popularity of endpoint security solutions is due, in no small part, to the fact that cyber insurance providers are requiring or even incentivizing their adoption.

Recognizing that SMBs are at a disadvantage when it comes to protecting against cyber attacks, either due to existing resource constraints or the high costs of enterprise security tools, Coalition recommends MDR as the most effective way for businesses to add human expertise and scale its threat detection and response capabilities.

The rising popularity of endpoint security solutions is due, in no small part, to the fact that cyber insurance providers are requiring or even incentivizing their adoption.

When it comes to MDR, there are three key components: people, process, and technology.

  1. People: Is your MDR service backed by in-house expertise? Are the teams available 24/7 to not only monitor for suspicious activity but also respond quickly as needed?

  2. Process: Does your MDR service adhere to service-level agreements and operate within strict timelines? Are you given an opportunity to review your security logs regularly and ask questions?

  3. Technology: Is your MDR service built upon reliable EDR technology? Are you able to bring your own license for a different EDR technology? Can you customize rules and alerts or extend logging and monitoring of additional data sources?

With MDR, the endpoint security solution is only as good as the people supporting it.

Coalition Security™ can protect your business from the expanding universe of cyber threats with experts invested in minimizing your risk. We offer a wide range of security products and services that can help before, during, and after an attack. To learn more about Coalition Security, schedule a free consultation with our team.


INSURANCE-POWERED CYBERSECURITY 

Why Your Best Security Partner Might Be a Cyber Insurance Provider

Discover where legacy options fall short >


*Coalition Incident Response services provided through Coalition’s affiliate are offered to policyholders as an option via our incident response firm panel.
Coalition Insurance Solutions, Inc., an affiliate of Coalition, Inc. (“CIS”), a leading cyberinsurance insurance provider in the U.S, is a licensed insurance producer and surplus lines broker (Cal. license # 0L76155), acting on behalf of a number of unaffiliated insurance companies, and on an admitted basis through Coalition Insurance Company a licensed insurance underwriter (NAIC # 29530). Coalition Incident Response, Inc dba Coalition Security, an affiliate of Coalition Inc., provides security products and services globally. Coalition Security does not provide insurance products. Products and services may not be available in all countries and jurisdictions and insurance coverage is subject to underwriting requirements and actual policy language. Non-insurance products and services may be provided by independent third parties. See licenses and disclaimers.
Coalition is the marketing name for the global operations of affiliates of Coalition, Inc.
This blog post is designed to provide general information on the topic presented and is not intended to construe or the rendering of legal or other professional services of any kind. If legal or other professional advice is required, the services of a professional should be sought. The statements contained herein are not a proposal of insurance but are for informational purposes only. Insurance coverage is subject to and governed by the terms and conditions of the policy as issued. Coalition makes no representations regarding coverages, exclusions or limitations in any products offered on behalf of any insurer. The views and opinions expressed as part of this blog post do not necessarily state or reflect those of Coalition. Neither Coalition nor any of its employees make any warranty of any kind, express or implied, or assume any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, product or process disclosed. The blog post may include links to other third-party websites. These links are provided as a convenience only. Coalition does not endorse, have control over nor assumes responsibility or liability for the content, privacy policy or practices of any such third-party websites.
Copyright © 2025. All rights reserved. Coalition and the Coalition logo are trademarks of Coalition, Inc.

Tags:

Cyber ThreatsIncident ResponseSmall BusinessVulnerabilities

Related blog posts

See all articles
Security

Blog

Study Finds Small Businesses Underestimate Cyber Risk Reality

Coalition’s new Small Business Cybersecurity Study uncovers small business leaders’ experiences with and perceptions of cyber risk.
Joe ToomeyJune 25, 2025
Security
Security