What is Endpoint Detection and Response (EDR)?

preview_player
Показать описание

Cybersecurity tools like Endpoint Detection and Response are becoming increasingly important for businesses looking to bolster their defenses against hackers. IBM’s Sam Hector provides an overview of how EDR tools work, including their four main functions: collecting security data, detecting & responding to threats, proactively hunting for threats, and integrating with existing tools to produce reports.

#EDR #cybersecurity #ReaQta
Рекомендации по теме
Комментарии
Автор

Honestly, if they had a university, all the students would be geniuses. Easy to understand videos . Wish I could be part of the great team, even if it’s fully remote work 👏🏻 👏🏻

jse-
Автор

Love the style and clarity. And your own interpretation of it is what makes it unique

CyberTronics
Автор

Thank you brother, it is clear and easy to understand information ❤

Geeky-Boy
Автор

A concise and easy-to-understand discussion of EDR!

kevinszczepanski
Автор

The explanation is straightforward from here on out.

mr_null
Автор

Excellent video with nice explanation. Is it possible to give a video about Carbon Black EDR for Cloud.Thank you.

jmesrin
Автор

What is network contain & how to know what EDR is network contain or not?

rqqkdcd
Автор

Lots of praise in the comments, however I'm not seeing a big difference between EDR, as described in this video, and traditional centrally managed antivirus, anti-malware detection that includes both heuristic and signature based scheduled and real-time scanning. It sounds more like a marketing repackaging to me, but perhaps I'm missing something.

urbrneh
Автор

He has a blueish screen behind him. Coincidence?

AI_native
Автор

🤔actually there is no point if you think with all details

xmasquadron
Автор

So... as part of preventing backdoors on your network, you place a backdoor on every device that gathers data even when not connected? ...so the number one approach attackers will take is hijacking those very same agents and or emulating their characteristics to blend right in. Now everyone expects their devices to be compromised and weird activity is no longer a red flag because that weird is the new normal. This isn't sounding too good so far and there's still a lot of video to go.

zvxcvxcz
Автор

bro is the definition of "posh"

sametsahin-ehqj