Home SecurityHacking How to pick the best endpoint detection and response solution