{"id":43999,"date":"2021-11-18T18:00:07","date_gmt":"2021-11-18T18:00:07","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=101529"},"modified":"2021-11-18T18:00:07","modified_gmt":"2021-11-18T18:00:07","slug":"microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\/","title":{"rendered":"Microsoft named a Leader in IDC MarketScape for Modern Endpoint Security for Enterprise and Small and Midsize Businesses"},"content":{"rendered":"<p>The security stakes have never been higher and, consequently, the protection of endpoints as a key component of any extended detection and response (XDR) strategy has never been more critical\u2014for organizations of all sizes. Microsoft is thrilled to be recognized as a Leader in IDC\u2019s MarketScape reports for Modern Endpoint Security for both enterprise<sup>1<\/sup>&nbsp;and small and midsize businesses (SMB).<sup>2<\/sup><\/p>\n<p>The IDC MarketScape recognized Microsoft\u2019s commitment to cross-platform support with <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/endpoint-defender\" target=\"_blank\" rel=\"noopener\">Microsoft Defender for Endpoint<\/a>, noting that \u201cAs telemetry is the rocket fuel for AI- and machine learning-infused endpoint security solutions, Microsoft\u2019s breadth and volume are unequaled geographically and across customer segments (enterprise, small and midsize businesses, and consumer). With the support of macOS, iOS, and Android, Microsoft\u2019s telemetry pool is expanding and diversifying. Microsoft\u2019s expanded platform support also chips away at the long-standing advantage of endpoint security independent software vendors (ISVs).\u201d<\/p>\n<p>Microsoft\u2019s vision for XDR was also cited as a differentiator, as Microsoft Defender for Endpoint is a key component of <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/microsoft-365-defender\" target=\"_blank\" rel=\"noopener\">Microsoft 365 Defender<\/a>, extending protection from devices to a single, integrated solution across all assets. \u201cMicrosoft\u2019s strategic vantage point is more than its Windows operating system. Directory service of Active Directory, web browser of Microsoft Edge, and the ubiquitous business productivity apps of Office 365 provide Microsoft native visibility and control across common endpoint attack vectors. These security building blocks available through Microsoft licensing agreements (E3 and E5) and as standalone options have contributed to Microsoft\u2019s market strength and momentum in modern endpoint security.\u201d<\/p>\n<h2>Security for all<\/h2>\n<p>Everyone expects hackers to target big, lucrative targets. Modern endpoint security is a key component for any XDR strategy for enterprise security teams, along with identity, email, application, and cloud security protection. However, small businesses are also a popular target even if they are less prevalent in the headlines.<\/p>\n<p>According to a recent <a href=\"https:\/\/www.connectwise.com\/resources\/smb-research\" target=\"_blank\" rel=\"noopener\">SMB cybersecurity report<\/a>, 55 percent of SMBs have experienced a cyberattack. Many SMB companies hold valuable information that can be exploited, such as customer and employee personal information, payment information, and more. Next-generation threats, like human-operated ransomware, are a danger to organizations of all sizes but are too rarely addressed by traditional endpoint protection platform (EPP) solutions.<\/p>\n<p>As part of our commitment to <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/11\/02\/protect-your-business-with-microsoft-securitys-comprehensive-protection\/\" target=\"_blank\" rel=\"noopener\">security for all<\/a>, Microsoft has renewed its pledge to bring enterprise security to SMBs and nonprofits, boosting cloud security programs and expanding intrusion prevention and detection tech to cover Amazon Web Services (AWS).<\/p>\n<p>With the launch of&nbsp;<strong><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/small-and-medium-business-blog\/introducing-microsoft-defender-for-business\/ba-p\/2898701\" target=\"_blank\" rel=\"noopener\">Microsoft Defender for Business<\/a><\/strong>, Microsoft delivers capabilities such as antivirus, threat and vulnerability management, and endpoint detection and response (EDR), across a broad range of desktop and mobile platforms, including Windows, macOS, Android, and iOS.<\/p>\n<p>Built on the foundation of Microsoft Defender for Endpoint, SMBs will be able to focus on addressing weaknesses that pose the highest risk to their environments, as well as to reduce attack surface with application control, ransomware mitigation, network and web protection, and firewall. The solution also provides next-generation protection (on devices and in the cloud) and automated investigation and remediation, while also allowing admins to automate workflows and integrate security data into existing solutions.<\/p>\n<p>Defender for Business doesn\u2019t require special security knowledge to install and use, and it comes with a simplified client configuration with recommended security policies enforced from the get-go<\/p>\n<p>\u201cWe need to have security for all, security that protects everything,\u201d said <a href=\"https:\/\/news.microsoft.com\/november-2021-ignite\/\" target=\"_blank\" rel=\"noopener\">Vasu Jakkal<\/a>, Corporate Vice President for Security, Compliance, and Identity. \u201cSecurity is a team sport, after all.\u201d<\/p>\n<h2>Learn More<\/h2>\n<p>Read more about <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/microsoft-defender-business#:~:text=What%20is%20Microsoft%20Defender%20for%20Business%3F%20Microsoft%20Defender,package.%20Is%20Microsoft%20Defender%20for%20Business%20in%20preview%3F\" target=\"_blank\" rel=\"noopener\">Microsoft Defender for Business<\/a>, which offers enterprise-grade endpoint protection that\u2019s cost-effective and easy to use\u2014designed especially for businesses with up to 300 employees.<\/p>\n<p>Readers seeking complete endpoint security can learn more about <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/endpoint-defender\" target=\"_blank\" rel=\"noopener\">Microsoft Defender for Endpoint<\/a>, Microsoft\u2019s industry-leading, cloud-powered endpoint security solution offering vulnerability management, endpoint protection, EDR, and mobile threat defense. Sign up for a <a href=\"https:\/\/go.microsoft.com\/fwlink\/p\/?LinkID=2176308&amp;clcid=0x409&amp;culture=en-us&amp;country=US\" target=\"_blank\" rel=\"noopener\">free trial<\/a> today.<\/p>\n<p>You can download the excerpts of the following reports for more details:<\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p>We thank our customers and partners for being on this journey with us.<\/p>\n<figure id=\"attachment_101688\" aria-describedby=\"caption-attachment-101688\" class=\"wp-caption alignnone\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-101688 size-large\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/US48304721tabfig_1-1024x1017.png\" alt=\"IDC MarketScape chart for Worldwide Modern Endpoint Security for Small and Midsize Businesses Vendor Assessment. Features Microsoft in top right hand corner under Leader.\" width=\"1024\" height=\"1017\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/US48304721tabfig_1-1024x1017.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/US48304721tabfig_1-300x298.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/US48304721tabfig_1-150x150.png 150w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/US48304721tabfig_1-768x763.png 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/US48304721tabfig_1-1536x1526.png 1536w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/US48304721tabfig_1-2048x2034.png 2048w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/US48304721tabfig_1-100x100.png 100w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><figcaption id=\"caption-attachment-101688\" class=\"wp-caption-text\">IDC MarketScape vendor analysis model is designed to provide an overview of the competitive fitness of information and communication technology (ICT) suppliers in a given market. The research methodology utilizes a rigorous scoring methodology based on both qualitative and quantitative criteria that results in a single graphical illustration of each vendor\u2019s position within a given market. The Capabilities score measures vendor product, go-to-market, and business execution in the short term. The Strategy score measures alignment of vendor strategies with customer requirements in a three to five-year timeframe. Vendor market share is represented by the size of the icons.<\/figcaption><\/figure>\n<figure id=\"attachment_101691\" aria-describedby=\"caption-attachment-101691\" class=\"wp-caption alignnone\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-101691 size-large\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/US48306021tabfig_1-ENTERPRISE-1024x1016.png\" alt=\"IDC MarketScape chart for Worldwide Modern Endpoint Security for Enterprises Vendor Assessment. Features Microsoft in top right hand corner under Leaders.\" width=\"1024\" height=\"1016\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/US48306021tabfig_1-ENTERPRISE-1024x1016.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/US48306021tabfig_1-ENTERPRISE-300x298.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/US48306021tabfig_1-ENTERPRISE-150x150.png 150w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/US48306021tabfig_1-ENTERPRISE-768x762.png 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/US48306021tabfig_1-ENTERPRISE-1536x1524.png 1536w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/US48306021tabfig_1-ENTERPRISE-2048x2032.png 2048w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/US48306021tabfig_1-ENTERPRISE-100x100.png 100w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><figcaption id=\"caption-attachment-101691\" class=\"wp-caption-text\">IDC MarketScape vendor analysis model is designed to provide an overview of the competitive fitness of information and communication technology (ICT) suppliers in a given market. The research methodology utilizes a rigorous scoring methodology based on both qualitative and quantitative criteria that results in a single graphical illustration of each vendor\u2019s position within a given market. The Capabilities score measures vendor product, go-to-market, and business execution in the short term. The Strategy score measures alignment of vendor strategies with customer requirements in a three to five-year timeframe. Vendor market share is represented by the size of the icons.<\/figcaption><\/figure>\n<hr>\n<p><sup>1<\/sup>IDC MarketScape: Worldwide Modern Endpoint Security for Enterprises 2021 Vendor Assessment, Doc #US48306021. November 2021.<\/p>\n<p><sup>2<\/sup>The IDC MarketScape: Worldwide Modern Endpoint Security for Small and Midsize Businesses 2021 Vendor Assessment, Doc #48304721. November 2021.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/11\/18\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The security stakes have never been higher and, consequently, the protection of endpoints as a key component of any extended detection and response strategy has never been more critical\u2014for organizations of all sizes. Microsoft is thrilled to be recognized as a Leader in IDC\u2019s MarketScape reports for Modern Endpoint Security for both enterprise\u00a0and small and midsize businesses.<br \/>\nThe post Microsoft named a Leader in IDC MarketScape for Modern Endpoint Security for Enterprise and Small and Midsize Businesses appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":44000,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347],"class_list":["post-43999","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft named a Leader in IDC MarketScape for Modern Endpoint Security for Enterprise and Small and Midsize Businesses 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft named a Leader in IDC MarketScape for Modern Endpoint Security for Enterprise and Small and Midsize Businesses 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-18T18:00:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/US48304721tabfig_1-1024x1017.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft named a Leader in IDC MarketScape for Modern Endpoint Security for Enterprise and Small and Midsize Businesses\",\"datePublished\":\"2021-11-18T18:00:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\\\/\"},\"wordCount\":960,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses.png\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\\\/\",\"name\":\"Microsoft named a Leader in IDC MarketScape for Modern Endpoint Security for Enterprise and Small and Midsize Businesses 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses.png\",\"datePublished\":\"2021-11-18T18:00:07+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses.png\",\"width\":1024,\"height\":1017},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft named a Leader in IDC MarketScape for Modern Endpoint Security for Enterprise and Small and Midsize Businesses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft named a Leader in IDC MarketScape for Modern Endpoint Security for Enterprise and Small and Midsize Businesses 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft named a Leader in IDC MarketScape for Modern Endpoint Security for Enterprise and Small and Midsize Businesses 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-11-18T18:00:07+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/US48304721tabfig_1-1024x1017.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft named a Leader in IDC MarketScape for Modern Endpoint Security for Enterprise and Small and Midsize Businesses","datePublished":"2021-11-18T18:00:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\/"},"wordCount":960,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses.png","keywords":["Cybersecurity"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\/","name":"Microsoft named a Leader in IDC MarketScape for Modern Endpoint Security for Enterprise and Small and Midsize Businesses 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses.png","datePublished":"2021-11-18T18:00:07+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses.png","width":1024,"height":1017},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Microsoft named a Leader in IDC MarketScape for Modern Endpoint Security for Enterprise and Small and Midsize Businesses"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43999","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43999"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43999\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/44000"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}