A company hired us to try to break into their network. Not a vulnerability scan. Not a compliance checkbox. A real, full-scope penetration test -- the kind where we use the same tools and techniques that actual attackers use every day.
What we found should concern every business owner who's been told their cybersecurity software has them covered.
The Setup
The company had the most widely used endpoint detection and response (EDR) platform in the managed IT industry installed on their workstations. This is the product that thousands of IT companies rely on. The one they point to when you ask "are we secure?" The one that shows up in every sales pitch and every compliance checklist.
We targeted one of their workstations and ran a full attack chain. Credential harvesting. Privilege escalation. Lateral movement. The kind of thing a moderately skilled attacker could pull off with freely available tools and a YouTube tutorial.
What We Saw
As part of every pentest engagement, we deploy monitoring software on the target workstation to capture everything that happens during the attack -- every connection, every process, every escalation attempt. This is how we build the report that shows the company exactly where their weaknesses are so they can fix them.
That monitoring picked up the attack within seconds. Every stage was visible in real time.
Then we looked at the EDR dashboard. Nothing. Not a single alert.
We waited. Refreshed. Checked the agent status to make sure it was running. It was. The software was installed, active, and healthy -- doing exactly what the vendor said it would do.
It just wasn't detecting anything.
Seven hours later, still nothing.
Let that sink in. The product that was supposed to be the last line of defense, the thing this company was told would catch the bad guys, completely missed a real attack happening on a live machine. Not a theoretical attack. Not a "what if" scenario. A real one.
This Isn't a Fluke
We've been in cybersecurity and managed IT for 15 years. What happened in this test isn't an outlier -- it's the norm. And the reason is simple: most cybersecurity products are built to check a box, not to actually protect you.
The EDR industry figured out something brilliant from a business perspective and terrible from a security perspective. They realized that most buyers don't test the product. Ever. You buy it, your IT company installs it, it shows a green checkmark on a dashboard, and everyone moves on. The compliance auditor sees the checkmark. The insurance company sees the checkmark. Nobody ever asks: "but does it actually work?"
So the vendors optimize for checkmarks. They optimize for dashboards that look impressive. They optimize for sales decks with threat intelligence feeds and AI buzzwords. What they don't optimize for is catching an actual attacker sitting on your network.
Why EDR Products Miss Real Attacks
EDR tools aren't useless. They do catch things. But many of them are built primarily around signature-based detection -- they recognize known malware, known file hashes, known patterns of bad behavior. If an attacker uses a technique that doesn't match a signature in the database, the tool doesn't see it.
Modern attackers know this. They use fileless malware, living-off-the-land techniques (using legitimate system tools for malicious purposes), and custom payloads that don't match any known signature. The attack surface has changed. The tooling, in many cases, hasn't kept up.
There's also a business model problem. Many EDR vendors sell to thousands of IT companies who deploy the product and move on. The vendor's job is to minimize false positives so the product doesn't generate too many alerts, because alert fatigue leads to customer churn. The unintended consequence: the product is tuned to be quiet. Quiet is good for customer satisfaction. Quiet is terrible for catching real attacks.
Vulnerability Scan vs. Penetration Test
Part of the problem is that most businesses don't understand the difference between these two things. They get used interchangeably, but they are very different.
A vulnerability scan is automated software looking for known weaknesses -- outdated software, missing patches, misconfigured settings. It tells you what could be a problem. Think of it as a home inspector walking through your house and noting that the back door lock is loose.
A penetration test is an actual attack. We try to break into your systems using the same tools, techniques, and creativity that a real attacker would use. We don't just find the loose lock -- we pick it, walk inside, and show you exactly what an intruder could access. It tells you what is a problem, right now, in practice.
Most businesses that think they've had a "pentest" have actually had a vulnerability scan. And most businesses that rely on a single EDR product have never tested whether it would actually catch someone breaking in. That gap between assumption and reality is where breaches happen.
The Question You Need to Ask
If your IT company installed software on your machines and told you it would protect you, ask them one question: have they ever actually tested it?
Not "does the vendor say it works?" Not "is it on Gartner's magic quadrant?" Not "does it have a cool dashboard?" Have they, your IT provider, the people you're paying to keep you safe, ever run a real attack against your environment to see if the tools they sold you actually do what they promised?
We already know the answer for 95% of you reading this. They haven't. They installed it and moved on. Maybe they ran the vendor's own test, which is like asking a student to grade their own exam.
That's not security. That's theater.
What You Should Do
1. Demand a real penetration test. Not a vulnerability scan. Not a compliance checkbox. An actual, authorized attack against your environment, conducted by professionals who know how to simulate real-world threat actors. If your tools can't detect it, you need to know that before a real attacker shows you the hard way.
2. Don't rely on a single product. Layered security isn't a buzzword. It's a design principle. Your EDR should be one layer. Independent monitoring should be another. Each layer catches what the others miss.
3. Ask your IT provider hard questions. When was the last time they tested your defenses? Not scanned -- tested. Can they show you evidence that your tools detected a simulated attack? If the answer is "we haven't done that," you have a gap that needs closing.
4. Stop trusting dashboards. A green dashboard means the software is running. It does not mean you are secure. Those are two very different statements.
The Bottom Line
The monitoring we deployed during this test caught the attack in seconds. The industry's most popular EDR platform missed it entirely for over seven hours. That's not a minor gap. That's a fundamental failure to do the one thing the product was designed to do.
If your IT provider can't show you real test results from your own environment, that tells you everything you need to know.
The cybersecurity industry has spent years selling you confidence. It's time to start demanding proof.
Want to Know If Your Tools Would Pass the Same Test?
We run real penetration tests that show you exactly where your defenses hold up and where they don't. No sales pitch. Just results.
Book a Free Consultation