
If possible work directly with the vendor of the product to avoid the VAR pressing you in any one direction. Protection for malware and non-malware attacksĬonsult with several VARs with any product being looked at.

Implementation Structure and architecture.Ħ. Malware detection rates (NSS labs, IDC, Gartner and etc.)ĥ. And get an idea about the features currently available in market.Ģnd step – Considering those features select which are more suitable for your environment, always need to consider the latest advance features rather than looking for a common traditional AV features.ģrd step- Select one or two best product that will suite for your environment and get proper evaluation licenses from expertise and do the evaluation.Ĥ. Also you have to consider feature security implementation, if there, because sometimes we do focus only Antivirus and later may need some additional feathers such as DLP, Encryption, Web and App filtering.ġst step - Selected few antivirus Product and do feature comparison at technical point of view. It is important to have a new solution but that can integrate more security solutions such as identity management, devices and information, consolidate solutions.īefore you do end point evaluation, I think you should identify proper requirement and feathers that you required. The new EPP + EDR solution if meets everything expected, the cost should not be the first option to evaluate. The most important thing of all comes, both technical and functional tests have already been done, the time has come to review costs. It is highly recommended that the tests performed on the new solution, also with the same laboratory will be tested on the current EPP solution, confirm that it is working as expected. Now, for the tests, you must also consider the technical aspects such as: Implementation, Performance, Response to conventional and advanced Threats, if you have Artificial Intelligence if you can add an Endpoint Detection and Response (EDR) solution. what are the expected features at the functional and response level of the Endpoint Protection Platform (EPP) solution. Hello, the best way to carry a proof-of-concept is to implement an environment as much as possible, at least a few users who are part of all kinds of company profiles, for example, financial, marketing, human resources, legal, technology, etc. Sometimes products change over the course of time or support gets work, but this general method works for the US. If they do well and the price point is right we typically start working on an SOW and agreement with the vendor and get a quote to purchase from there. Once the requirements are completely charted either success or failure in the checklist we then review how those top 2 or 3 vendors performed and score them accordingly. features, failover testing when things go bad, etc. for the POC to see how each vendor performs: stops virus, test remote healing, replication, client mgmt. We then work with our VAR to help coordinate a POC for us from anywhere from 30-90days depending on the vendor/product. That usually narrows it down to 2 or 3 tops for vendors to choose from. It does not store any personal data.Once you have narrowed down the top 5 picks for a capability/solution, we typically will look at the last few things that make things stand out from the competition.ġ-cost, 2-ease of deployment (need prof serv?) 3-support or training if all other features of products being similar of course. The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. The cookie is used to store the user consent for the cookies in the category "Performance". This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".


The cookie is used to store the user consent for the cookies in the category "Other. The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". The cookie is used to store the user consent for the cookies in the category "Analytics". These cookies ensure basic functionalities and security features of the website, anonymously. Necessary cookies are absolutely essential for the website to function properly.
