Posted on
in Presentations
EDR is evolving beyond managed endpoints, so that detection and response decisions can benefit from email and network telemetry. This approach, known as XDR, correlates endpoint activity to email motion, and sees which endpoint actions result in anomalous network activity. You’ll see a few real-world attack scenarios, and how they’re detected and investigated with and without an XDR approach.
Pre-Requisites: Awareness and high-level understanding of current endpoint security, EDR (endpoint detection & response), and SIEM technologies is helpful.
Pre-Requisites: Awareness and high-level understanding of current endpoint security, EDR (endpoint detection & response), and SIEM technologies is helpful.
Technology Infrastructure & Operations Hackers & Threats
network security incident response endpoint security cloud security
Topic
Technology Infrastructure & Operations
Hackers & Threats
Subtopic
network security
incident response
endpoint security
cloud security
Share With Your Community