What is Endpoint Detection and Response (EDR)?
Vložit
- čas přidán 22. 07. 2024
- Learn more about QRadar EDR → ibm.biz/QRadar-EDR
Dive deeper into EDR solutions → ibm.biz/what-is-EDR
EDR solution guide → ibm.biz/EDR-buyers-guide
Cybersecurity tools like Endpoint Detection and Response are becoming increasingly important for businesses looking to bolster their defenses against hackers. IBM’s Sam Hector provides an overview of how EDR tools work, including their four main functions: collecting security data, detecting & responding to threats, proactively hunting for threats, and integrating with existing tools to produce reports.
Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
#EDR #cybersecurity #ReaQta
Honestly, if they had a university, all the students would be geniuses. Easy to understand videos . Wish I could be part of the great team, even if it’s fully remote work 👏🏻 👏🏻
Love the style and clarity. And your own interpretation of it is what makes it unique
Agreed. It also comes with a thorough understanding of the subject matter.
The explanation is straightforward from here on out.
A concise and easy-to-understand discussion of EDR!
Thank you brother, it is clear and easy to understand information ❤
Great video! Thank you!
Lovely explanation
Excellent video with nice explanation. Is it possible to give a video about Carbon Black EDR for Cloud.Thank you.
Excellent. Thank you
What is network contain & how to know what EDR is network contain or not?
great video!
Lots of praise in the comments, however I'm not seeing a big difference between EDR, as described in this video, and traditional centrally managed antivirus, anti-malware detection that includes both heuristic and signature based scheduled and real-time scanning. It sounds more like a marketing repackaging to me, but perhaps I'm missing something.
He has a blueish screen behind him. Coincidence?
🤔actually there is no point if you think with all details
So... as part of preventing backdoors on your network, you place a backdoor on every device that gathers data even when not connected? ...so the number one approach attackers will take is hijacking those very same agents and or emulating their characteristics to blend right in. Now everyone expects their devices to be compromised and weird activity is no longer a red flag because that weird is the new normal. This isn't sounding too good so far and there's still a lot of video to go.
Oh, ... and you want them invisible to the OS? LMAO, at this point you are the threat and your employees should flee as soon as possible because they work in a dystopian nightmare where invisible backdoors are lauded as good. If you're going to watch me, I should be able to watch you watching me.
And you want them to use AI... this is a recipe for disaster. False positives on this are going to destroy people's careers. Mark my words.
Intern talking like an old pro.
bro is the definition of "posh"