Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom Lenovo Newsroom Nutanix Newsroom Cisco Live Newsroom HPE Zone Tech Provider Zone

12 Most Exciting Cybersecurity Technologies To Watch At Black Hat 2019

CRN asks 12 executives, sales and technical leaders attending Black Hat 2019 which cybersecurity technologies they're most excited to see come to fruition and how customers and solution providers will benefit.

Back 1 ... 7   8   9   10   11   ... 13 Next
photo

Endpoint Detection And Response For Midmarket

Endpoint detection and response (EDR) technology makes it possible to stream data from each endpoint and make access determinations on more of a real-time basis, according to Malwarebytes CEO Marcin Kleczynski. By coupling detection and response capabilities together, Kleczynski said organizations are able to block whatever threats they can and understand the threats they can't.

Strong EDR tools provide threat hunting and process graphing while isolating threats such as reverse shell, Kleczynski said. But conventional EDR tools were designed for large enterprises that have personnel on-site to respond to complex queries, according to Kleczynski.

End users shouldn't have to run custom SQL queries against their own data, which Kleczynski likened to attempting to stuff five-pound columns into a backpack. Midmarket companies need EDR capabilities that can be managed as well as automatically generated alerts for items that appear suspicious, he said.

 
 
Back 1 ... 7   8   9   10   11   ... 13 Next

sponsored resources