On July 12, 2021, NetSPI Director of Research Nick Landers was featured in an article from SC Magazine:

Endpoint detection and response systems can often serve as a frontline defense for many organizations, collecting and storing telemetry from dispersed employee devices and using it to detect malicious activities or behaviors. However, a recent experiment by academic researchers at the University of Piraeus in Greece indicates they are far from a silver bullet when it comes to protecting your organization….

Nick Landers, director of research at penetration testing company NetSPI, told SC Media that that it’s rare for one team or company to even have access to such a wide range of EDR systems and any research that can test and compare different products in the EDR market is valuable in and of itself. 

He said the results outlined in the study largely mirror his experience with customers, and that many advanced threat actors generally rely on two strategies for evading detection by EDR systems: using completely unique or novel tactics that can frustrate heuristic analysis or data algorithms, and “not making noise in general” by understanding what telemetry EDR systems collect and measure.

“I think the ones we see that are the most effective are ones where the attacker understands the data [the EDR system is] collecting and keeps generation of that data low,” he said. 

However, Landers said his main takeaway from the study is not necessarily that EDR products are shoddy or not worth the cost (though he again lamented the lack of access that independent third parties typically have to test such systems), but rather a “more constructive” reinforcement of the need for multiple layers of security to ensure any one tool or process doesn’t become a single point of failure.

“I think looking at the minutiae and finger-pointing and trying to identify specific products and their specific failings is a fault that belongs to everyone in the industry,” he said. “But [EDR systems] are valuable tools and while I might not agree with their strategy or their marketing or cost or licensing model or availability, I think they do contribute to a defense in depth strategy and that’s ultimately what we should all be striving for.”

To learn more, read the full article here: https://www.scmagazine.com/news/network-security/edr-alone-wont-protect-your-organization-from-advanced-hacking-groups

Explore More News

Press Releases | March 12, 2026

NetSPI Recognized in the Inaugural Proactive Security Platforms Landscape  

NetSPI®, the global leader in modern penetration testing, today announced its inclusion among notable vendors in The Proactive Security Platforms Landscape, Q1 2026 report by Forrester. The overview examines 42 vendors in the proactive security platform market. 

Learn More
Press Releases | March 4, 2026

NetSPI Recognized in the 2026 GigaOm Radar Report for Attack Surface Management (ASM) 

NetSPI Recognized in the 2026 GigaOm Radar Report for Attack Surface Management (ASM)  Minneapolis, MN – March 4, 2026 – NetSPI®, the global leader in modern penetration testing, today announced it has been recognized in the 2026 GigaOm Radar Report for Attack Surface Management (ASM). GigaOm analysts Chris Ray and Whit Walters’ forward-looking report evaluates 32 ASM solutions based on their feature capabilities and nonfunctional requirements that factor into purchase decisions and determine a solution’s material impact on an organization.   The recognition validates NetSPI’s continued momentum and fierce investment in platform […]

Learn More
NetSPI in the News | January 27, 2026

VM Blog: Five Security Shifts that Will Define 2026

Joe Evangelisto outlines several critical shifts demanding executive attention. As organizations move from open AI experimentation to governed application, leaders must implement safeguards to manage data exposure and ensure system integrity.

Learn More