Summary
Endpoint security is one of the highest-volume procurement categories in EU government cybersecurity, encompassing antivirus and anti-malware software (the most frequently renewed contracts), Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) platforms, and Mobile Device Management (MDM) solutions. The transition from legacy antivirus to AI-powered EDR/XDR has created a major replacement cycle across EU public sector, with virtually every significant government IT estate actively evaluating or refreshing endpoint protection. This guide covers the platforms being procured, the key CPV codes, public tender requirements, EUCS alignment considerations, and the different contract structures vendors and resellers encounter.
The Endpoint Security Market in EU Government
Every government workstation, server, and mobile device requires endpoint protection β making this the most universal procurement category in cybersecurity. The market is transitioning from signature-based antivirus (legacy products from Kaspersky, Symantec/Broadcom, McAfee/Trellix) to AI-powered EDR and XDR platforms capable of detecting sophisticated, fileless, and zero-day threats.
Several factors are accelerating this transition in the public sector:
- Kaspersky ban: Following the 2022 invasion of Ukraine, Germany's BSI and several other EU national cybersecurity agencies issued formal warnings against Kaspersky products. Multiple EU member states have actively replaced Kaspersky in government environments, creating a procurement wave for alternative endpoint protection.
- NIS2 requirements: Article 21's requirement for malware protection, logging, and incident detection capabilities is pushing authorities to upgrade from basic antivirus to full EDR capability.
- Microsoft Defender expansion: Many authorities already running Microsoft 365 are consolidating onto Microsoft Defender for Endpoint (included in E3/E5 licensing), creating displacement opportunities for incumbent AV vendors but also for MDR services built on Defender.
- Ransomware pressure: Government ransomware attacks have created board-level urgency to modernise endpoint protection with genuine behavioural detection capabilities.
EDR/XDR Platform Landscape in EU Government
The leading EDR/XDR platforms in EU government procurement:
- Microsoft Defender for Endpoint: Dominant in Microsoft-centric government environments. Procurement often flows through Microsoft enterprise agreements rather than standalone security contracts. MDR services and deployment support for Defender create third-party contract opportunities.
- CrowdStrike Falcon: Leading independent EDR platform. Strong detection performance credentials. Data sovereignty questions around US-based telemetry are raised in some EU government tenders.
- SentinelOne: Growing market share in European government, particularly in mid-tier public bodies. Autonomous AI-driven response capability is a key differentiator.
- Trellix (formerly McAfee Enterprise/FireEye): Legacy installed base in government, undergoing active replacement in many environments.
- Bitdefender: Romanian-origin product with strong EU data residency story. Growing in public sector procurement across CEE member states.
- WithSecure (formerly F-Secure): Finnish-origin vendor with strong EU credentials and Nordic government market share.
Antivirus Framework Agreements
Traditional antivirus β still required for legacy systems, embedded devices, and environments where full EDR is not feasible β is frequently procured through national framework agreements. These frameworks allow individual public bodies to call off licences without competitive tender, typically at pre-negotiated per-seat pricing. For software vendors and their resellers, getting onto national AV/endpoint frameworks is a prerequisite for capturing the high-volume, lower-value renewal contracts that form the backbone of endpoint security revenue.
Key national frameworks to monitor for endpoint security lots: France's UGAP IT frameworks, Germany's TVΓΆD-aligned federal IT procurement vehicles, the Netherlands' ICTU frameworks, and UK's G-Cloud (relevant for vendors targeting British public sector).
Mobile Device Management Procurement
MDM and Unified Endpoint Management (UEM) procurement has grown substantially as government workforces have become increasingly mobile and hybrid. MDM contracts cover platform licensing (Microsoft Intune, Jamf, VMware Workspace ONE, IBM MaaS360), deployment and configuration services, and ongoing management. Mobile security considerations β enforcing encryption, remote wipe capability, app whitelisting β are increasingly specified in tender requirements as NIS2 extends endpoint security obligations to mobile devices.
Key CPV Codes
- 48761000 β Anti-virus software package (primary code for antivirus and EDR licensing)
- 48730000 β Security software package (broader security software including EDR/XDR)
- 48000000 β Software packages and information systems
- 72212517 β IT software development services (for endpoint security management tools)
- 72250000 β System and support services (managed EDR services)
- 32250000 β Mobile phones (MDM often bundled with device procurement)
EUCS Alignment and Data Sovereignty
For cloud-delivered endpoint security platforms (which now includes virtually all EDR/XDR products), data sovereignty is an active evaluation criterion in sensitive government tenders. Telemetry data β threat detection events, file hashes, process information β flows continuously from endpoints to vendor cloud infrastructure. Where this data is processed and stored, and whether it is subject to US government access requests under the Cloud Act or FISA, is a legitimate procurement question that vendors must be prepared to answer with specificity.
Vendors with EU-hosted telemetry processing options (CrowdStrike's EU cloud, Microsoft's EU Data Boundary, SentinelOne's EU instance) are better positioned for sensitive government contracts than those processing all telemetry through US infrastructure.
Winning Strategy
For software supply contracts, independent test results (AV-TEST, AV-Comparatives, SE Labs certifications) provide objective quality evidence. For managed EDR services, demonstrating response capability β mean-time-to-detect, mean-time-to-respond, case studies of real threat hunting engagements β is decisive. For resellers, the combination of vendor certifications, local implementation references, and competitive pricing on renewals drives market share. In all cases, addressing data sovereignty concerns directly and proactively β rather than waiting for evaluators to raise them β signals the maturity and public sector awareness that distinguishes winning bids.