EPP, EDR, XDR, MDR... WTF?!

Demystifying Security Services

Setting the Stage: Your Digital Office

Think of your computer system as an office inside a larger office building.

Security acronyms (EPP, EDR, XDR, MDR) are just different ways to guard that office. Vendors throw them around, but each one adds value in a specific way—and each has its own business model.

The critical point for Canadian institutions: you must hold the keys. If the vendor controls the locks, updates, or remote access, then under U.S. law they can be compelled to hand over your data.

What They Actually Do

Let’s go step by step, using the office example.

EPP (Endpoint Protection Platform)

What it does:

Why it matters:

How vendors make money:

EDR (Endpoint Detection and Response)

What it does:

Why it matters:

How vendors make money:

XDR (Extended Detection and Response)

What it does:

Why it matters:

How vendors make money:

MDR (Managed Detection and Response)

What it does:

Why it matters:

How vendors make money:

Canadian Sovereignty — Must-Have Rules (FIPPA Fit)

For Ontario FIPPA compliance, security tools must follow these rules:

  1. Data residency – all logs and telemetry must remain in Canada and under your direct control.

  2. Customer key custody – you must hold the encryption keys. No vendor escrow.

  3. Minimal collection – gather only what’s necessary.

  4. Transparency – document retention, flows, and processing.

  5. Access control – only your staff access logs, with immutable audit trails.

  6. Support/update limits – no vendor unilateral updates or has hidden remote access.

  7. Breach response – tools must let you detect and respond from inside Canada.

If any of these cannot be met, the product is not FIPPA-compliant.

Vendor Shortlist — XDR + Customer Holds the Keys

Only these platforms can deliver XDR and let you hold the keys, avoiding U.S. legal exposure:

All other SaaS-first XDR and MDR vendors are excluded—they hold keys, control updates, or route telemetry through U.S. clouds.

Why It Matters — The Full Risk

The myth: “Telemetry is just metadata.”
The reality: With vendor access, telemetry can be turned into full data capture.

How it plays out:

  1. Agents collect file opens, user sessions, process logs, and crash dumps.

  2. A U.S. authority issues a sealed CLOUD Act order. Vendor is compelled.

  3. Vendor uses keys, update channels, or support shells to:

    • Decrypt logs and dumps.
    • Capture entire files from disk.
    • Snapshot full databases.
    • Exfiltrate backups and forensic images.
  4. Vendor delivers full datasets, not just logs.

  5. Authorities re-identify anonymized research or health records.

Outcome: A direct FIPPA breach and ethical harm. The institution may never be notified.

How to Stop Full-Data Capture

Technical must-haves:

Contract must-haves:

Operational helpfuls:

Validation Tests to be Run

All must pass before production.

Recommendation

For any Ontario institution under FIPPA:

Rule of thumb:

Executive Summary – Cost and Value

5-Year TCO (200 endpoints, CAD):

Why this matters:

Validation is non-negotiable: Always test vendor promises with lab drills and security scenarios before production.