DNS Filtering
Antivirus was built
for a different era.
Modern attacks don't announce themselves. They move quietly, escalate slowly, and stay hidden until there's nothing left to recover. EDR watches what's actually happening on your devices — in real time — and stops threats before they spread.
✓
✓
✓
Plain-Language Explainer
What antivirus does
vs. what EDR does
Traditional antivirus software is a list of known bad things. It compares every file against a database of threats it's seen before. If an attack is new — or disguised — antivirus won't catch it.
Endpoint Detection & Response (EDR) works differently. It watches behaviour. It asks: is this program doing something a normal program wouldn't do? Is this user account accessing files it's never touched before? Is this device trying to communicate with a server in an unusual location?
EDR doesn't need to recognize an attack. It recognizes when something is behaving like an attack. And when it does, it can isolate the affected device, alert your IT team, and preserve a complete forensic record of everything that happened — automatically.
Traditional Antivirus
Recognizes what it already knows
✓
Misses new and unknown threats
✓
No visibility into attacker behaviour
✓
No automatic isolation or response
✓
No forensic trail after an incident
Endpoint Detection & Response
Watches what's actually happening
✓
Catches new threats by their behaviour
✓
Full timeline of every process and action
✓
Automatically isolates compromised devices
✓
Complete forensic evidence for investigation
What's included
The attacks that antivirus misses entirely
Modern attackers have learned to work around signature-based tools. Here's what EDR is specifically built to catch.
High Risk
Ransomware
Encrypts your files and demands payment. EDR detects the unusual mass-file-write behaviour before the encryption completes and isolates the device automatically.
High Risk
Fileless Malware
Runs entirely in memory — nothing written to disk for antivirus to scan. EDR watches process behaviour, not files, so these attacks are visible anyway.
High Risk
Credential Theft
Attackers dump password hashes from Windows memory. EDR detects this access pattern and alerts before stolen credentials are used.
Significant Risk
Living-off-the-Land Attacks
Attackers misuse legitimate Windows tools like PowerShell and WMI — tools already on your machine — to avoid detection. EDR flags when these tools are used in unusual ways.
Significant Risk
Supply Chain Compromise
Legitimate software is tampered with before you install it. EDR's behavioural analysis catches it when installed software starts behaving maliciously.
Significant Risk
Insider Threats
An employee — or their compromised account — accessing files they never normally touch. EDR detects the anomaly, whether the threat is malicious or accidental.
Our Platform Partners
CrowdStrike and SentinelOne.
Both. Neither. Whichever fits.
We're authorized partners for both platforms. We don't have a preferred vendor — we have a preferred outcome. After assessing your environment, we'll tell you which one makes more sense for you, and why.
CrowdStrike Falcon
Built for sophisticated threat environments
✓
AI-powered threat intelligence updated continuously across millions of endpoints globally
✓
Cloud-native — no performance impact on your devices
✓
Industry-leading in independent third-party testing (MITRE ATT&CK evaluations)
✓
Strong fit for law enforcement, government contractors, and regulated industries
SentinelOne Singularity
Autonomous detection with deep forensics
✓
Fully autonomous response — detects, contains, and remediates without human intervention
✓
Storyline technology builds a complete attack narrative automatically
✓
One-click rollback — undo the damage ransomware caused without rebuilding from scratch
✓
Strong fit for businesses wanting maximum autonomy with minimal management overhead
Our honest take: Both platforms are genuinely excellent. The differences matter at the margins — specific compliance requirements, your existing security stack, device mix, and whether you want more manual control vs. full automation. We'll walk you through the decision. We don't earn more from one than the other.
Mobile-First Teams
From first call to fully protected
We handle deployment, configuration, tuning, and ongoing monitoring. You don't need an internal security team to run enterprise-grade EDR.
Assessment
Staff can make and receive business calls on their personal phone without giving out their personal number. The app shows your business caller ID — clients see your company, not someone's cell.
Platform Selection
Whether your team is on a job site, working from home, or traveling, they're always reachable on your business number. No forwarding setup. No missed calls going to personal voicemail.
Deployment & Tuning
If most of your staff use laptops and phones, you may not need desk phones at all. We'll help you figure out what combination makes sense — and whether desk phones are worth the extra cost for your team.
Ongoing Monitoring
Already using Microsoft Teams? Several platforms let you make and receive business phone calls directly inside Teams — without switching apps. Ideal for teams already living in the Microsoft 365 ecosystem.
Pricing & Plans
Included in every Lumitiv plan
EDR isn't a premium add-on we bolt on at the end. Endpoint protection is included at every service tier because we don't think security should be optional.
Essentials
EDR Included From Day One
Every Essentials client gets endpoint protection deployed and managed by us — no extra charge, no configuration required on your end.
Complete
EDR + Full IT Coverage
Complete adds unlimited IT support, patch management, and infrastructure monitoring around your EDR deployment. One team, one bill, fully managed.
Secure
Enterprise EDR + 24/7 SOC
Threats don't keep business hours. Secure adds round-the-clock Security Operations Centre monitoring — every alert is investigated and contained, day or night.
No annual contracts. All plans are month-to-month. Cancel with 30 days notice, no penalties, no pressure campaigns.
See full pricing →
Straight Talk
Things most vendors won't say out loud
Turns out a lot of businesses have the same concerns. Here are the honest answers.
EDR isn't a magic shield. No tool is.
We check availability with every carrier servicing your area — not just the ones with the biggest ad budgets. Fiber, coax, wireless — we'll show you exactly what's accessible at your address and what it'll cost.
Your cyber insurance probably requires it now.
We often help clients negotiate reduced or waived installation costs to get fiber pulled to a new building. If that's not feasible, we'll identify the best alternative — whether that's coax, fixed wireless, or a hybrid setup — and be honest about the tradeoffs.
A poorly configured EDR is nearly as bad as none.
We review your existing agreement and identify any exit windows, rate-change provisions, or anniversary clauses that let you switch without penalty. In cases where an early termination fee applies, we help you calculate whether the savings make it worth it.
Small businesses are the primary target, not an afterthought.
Internet carriers pay referral fees when businesses connect through an IT partner. Every carrier pays roughly the same rate, so we have no financial reason to push one over another. Our recommendation is based entirely on what fits your situation best.
FAQ
Questions we get a lot
Turns out a lot of businesses have the same concerns. Here are the honest answers.
Do I still need antivirus if I have EDR?
Yes — antivirus and EDR work together as two layers of defence. Antivirus handles known threats; EDR catches what antivirus misses. The good news is you don't need to pay for a separate antivirus product. Microsoft Defender, built into Windows, is completely sufficient. No additional antivirus subscription required.
Will EDR slow down our computers?
Both CrowdStrike and SentinelOne are cloud-native — most processing happens off-device, so the impact on your hardware is minimal. In independent testing, both platforms perform significantly better than traditional antivirus products. We regularly deploy to older hardware without performance issues.
How is this different from what's included in Microsoft 365?
Microsoft Defender is a solid first layer, but it's not an enterprise EDR platform. It lacks the behavioural detection depth, forensic investigation tools, and autonomous response capabilities of CrowdStrike or SentinelOne. For businesses handling sensitive data or facing compliance requirements, Defender alone isn't enough.
Does EDR work on Macs and Linux?
Yes. Both CrowdStrike and SentinelOne support Windows, macOS, and Linux. Mobile devices (iOS and Android) are covered through a separate mobile device management layer, which we can also deploy. We'll map your full device estate during the initial assessment.
What happens if a threat is detected?
The affected device is automatically isolated from the network before it can spread. Our team investigates the forensic timeline, determines what was accessed, and contacts you with a clear picture of what happened and what we're doing about it. You don't find out three weeks later.
Is EDR required for cyber insurance in Canada?
Increasingly, yes. Canadian insurers have tightened requirements significantly since 2022, with many policies now explicitly requiring EDR on all endpoints alongside MFA and regular backups. Coverage without meeting these requirements can be denied at claim time. We can review your policy and tell you exactly where you stand.
