A cybersecurity solution that monitors endpoints for suspicious activity and provides tools to respond to detected threats. Mobile app shielding, threat detection, and response are generally NOT categorized in EDR.
Popular EDR vendors include SentinelOne, Cynet, and CloudStrike.
Real-World Examples
Companies may incorporate EDR to monitor desktops, laptops, mobile phones, tablets, servers, and virtual machines (but not apps) to detect and respond to suspicious activity, such as unauthorized access attempts.