- Content source
- https://www.youtube.com/watch?v=005rfNO-ktU
OFFICIAL EDR Tier List for 2026! Based on nothing but the people in chat, vibes, guests, opinions and limited experience.
OFFICIAL EDR Tier List for 2026! Based on nothing but the people in chat, vibes, guests, opinions and limited experience.
EDR/SIEM requires both someone to review the outputs constantly (no automation because that will fail) and it requires maintenance. So unless you are paying someone to perform these tasks daily, then it is wasted money.I use EDR / SIEM to 'verify' my protective measures. By that I mean, protect is the thing you must do first. So you do your secure config of the OS, hardening, WD firewall rules, WD exploit protection etc, and then you config your security tools. When protect fails, you catch it with an EDR / SIEM with its detection. They are handy tools to see all problem indicator Event IDs on a single pane of glass. An alternative to edr / siem is to make Custom Views in Event Viewer.
I highly recommend that you at least do a penetration test bi-annually or when your security configuration changes. You can hire freelancers on freelancer.com or upwork.com. Costs $400-$600 for a week's worth of work. And only then should you breathe easy and declare to yourself that you are secure. Hint: a default configuration (default install Windows + commodity default AV config) is absolutely no good. You may say you are not a hacking target, but malware nowadays call back to the hacker's C2 and they then launch commands to hack you even more, so its the same thing. An attack is an attack, whether semi-automatic or manually done. Malware is only the first stage.
You forget there is a place filled with IT pro's called India.A "pentest" at this price point
Your counter-argument relies on the assumption that geography (outsourcing to India) justifies a >90% price reduction for skilled labor. This is a dangerous fallacy. Market data for 2026 confirms that qualified Indian offensive security engineers (CEH/OSCP certified) command professional rates ($20,000-$500,000 INR per project). A $400 USD/week rate implies an hourly wage of ~$2.50/hour, which is below the market rate for even entry-level IT support in major Indian tech hubs like Bangalore. This price point confirms the service is likely an automated script, not a professional manual penetration test.You forget there is a place filled with IT pro's called India.
The data point ($600 for 4 days) mathematically translates to $18.75/hour (assuming a standard 8-hour day). While this market rate exists on freelance platforms, it defines a specific tier of service, Commodity Vulnerability Assessment, not Penetration Testing. Legitimate offensive security engineers, who carry overheads like commercial licenses (Burp Suite Pro, Cobalt Strike) and liability insurance, cannot operate at this margin. The "bids" received were likely self-selected from a pool of low-skill or automated providers, creating a dangerous illusion of security verification.@Divergent I paid $600 for 4 days work. I gave that $400-$600 figure from the range of bets I received. The report shows what they have done, and I can tell it is not only a vulnerability scan.
| Tier | Vendor | Why it's there |
| S-Tier (God) | Elastic & Palo Alto | Perfect protection scores (Elastic) and industry-best anti-tampering (Cortex). |
| A-Tier (Elite) | CrowdStrike & SentinelOne | Massive market share and great AI, but slightly more "known" by attackers to bypass. |
| B-Tier (Solid) | Microsoft Defender | Incredible detection, but "noisy" and requires significant manual tuning to be great. |
| C-Tier (Standard) | Bitdefender & ESET | Excellent for small/medium business, but lacks the deep "hunting" tools pros want. |
That point is valid for traditional enterprise EDR, which assumes an analyst is reviewing alerts and making response decisions.The conflict between "Hardening" (@Victor M ) and "Operational Maintenance" (@bazang ). While Victor M correctly identifies that "Protect" functions must precede "Detect" tools, the recommendation to hire unvetted freelancers for $400/week constitutes a critical security risk. Bazang is operationally correct, EDR and SIEM solutions require human validation; without a "human in the loop," they become expensive shelfware. The optimal path is strict hardening coupled with professional, not budget, verification.
The specific claim that a valid penetration test costs "$400-$600 for a week" is mathematically incompatible with 2026 industry standards. Qualified offensive security engineers command hourly rates significantly higher than the ~$10-$15/hour this budget implies. A "pentest" at this price point is almost certainly an automated Vulnerability Scan (e.g., Nessus, OpenVAS) rebranded as a manual test. Worse, it creates a supply chain vulnerability, granting an unvetted, low-bid actor administrative or VPN access to your network invites data theft, persistence establishment, or extortion under the guise of "security testing."
@bazang 's assessment aligns with the MITRE D3FEND framework (D3-HVAL: Human Verification of Alert). EDRs are not "set and forget" tools. They generate telemetry that requires context, distinguishing between a sysadmin using PowerShell and an adversary using Invoke-Mimikatz. Without a dedicated analyst or a Managed Detection and Response (MDR) service to filter false positives, the "single pane of glass" becomes a flood of noise, leading to alert fatigue and missed detections.
Listen to bazang regarding tools. Do not install enterprise-grade EDR software at home unless you are a security professional prepared to act as your own SOC analyst. A standard, hardened Antivirus is often more effective for a home user because it automates the blocking decisions that an EDR would ask you to make manually.
There is a massive use case for this among Small-to-Medium Businesses (SMBs) and Prosumers who lack the budget for a 24/7 Security Operations Center (SOC). However, the inherent trade-off in this design is availability, relying on automation to block "behavior" (unlike static hashes) creates a high risk of False Positives that can disrupt legitimate operations. By leveraging allowlists alongside AI, one could effectively mitigate hallucinations and sharpen functional accuracy, provided these measures are anchored by a robust ring-fencing architecture.That point is valid for traditional enterprise EDR, which assumes an analyst is reviewing alerts and making response decisions.
But what about a streamlined, prevention-first EDR that keeps the behavioral depth of EDR while automating blocking decisions the way a hardened AV does, so the user isn’t asked to interpret alerts or act as their own SOC?
Just curious if you think there’s a real use case for a product like that.
The way I think about it is that automation only works if it’s ring-fenced and opinionated, not generic “block on behavior” logic. High-confidence behaviors (wiper-like delete bursts, entropy spikes on user data, abuse of specific LOLBins, etc.) can be enforced automatically, while anything ambiguous is either constrained or observed rather than outright blocked.There is a massive use case for this among Small-to-Medium Businesses (SMBs) and Prosumers who lack the budget for a 24/7 Security Operations Center (SOC). However, the inherent trade-off in this design is availability, relying on automation to block "behavior" (unlike static hashes) creates a high risk of False Positives that can disrupt legitimate operations. By leveraging allowlists alongside AI, one could effectively mitigate hallucinations and sharpen functional accuracy, provided these measures are anchored by a robust ring-fencing architecture.
Exactly. We are on the same page. The 'Prevention-First' goal requires the 'Ring-Fencing' architecture. Without that constraint layer, the 'False Positives' would kill the product. But with it, we finally get a 'SOC-in-a-Box' that actually works for the SMB and home users.The way I think about it is that automation only works if it’s ring-fenced and opinionated, not generic “block on behavior” logic. High-confidence behaviors (wiper-like delete bursts, entropy spikes on user data, abuse of specific LOLBins, etc.) can be enforced automatically, while anything ambiguous is either constrained or observed rather than outright blocked.
In other words, the goal wouldn’t be to replace allowlisting or hardening, but to layer behavioral enforcement on top of it, so availability is preserved while still removing the need for a human SOC loop.
Yes, we are on the same page, thank you!Exactly. We are on the same page. The 'Prevention-First' goal requires the 'Ring-Fencing' architecture. Without that constraint layer, the 'False Positives' would kill the product. But with it, we finally get a 'SOC-in-a-Box' that actually works for the SMB and home users.