Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events Acronis #CyberFit Summit 2021 Avaya Newsroom Experiences That Matter Cisco Partner Summit Digital 2020 Intel Partner Connect 2021

Black Hat 2019: 12 Cybersecurity Myths That Could Put You At Risk

CRN asks 12 executives, sales and technical leaders attending Black Hat 2019 what they see as the top oft-repeated beliefs about cybersecurity that are foolishly accepted as fact.

Back 1 ... 6   7   8   9   10   ... 13 Next

Endpoint Detection And Response Is Difficult

Analyst reports from organizations like Gartner and Forrester often claim that customers need a high degree of expertise to use an endpoint detection and response product, according to Dan Larson, CrowdStrike's vice president of product marketing.

This perception exists due to poorly implemented EDR tools that only collect data and then ask customers to find threats in the data by feeding in indicators of compromise or building hunts for scheduled data types, Larson said. If the burden is on the customer to find the data, Larson acknowledged it's going to be hard.

Good EDR products, though, will know how to automatically find threats in a data set by analyzing data and automating the detection and prevention of threats, according to Larson. "EDR doesn't have to be a science experiment," Larson said.

Back 1 ... 6   7   8   9   10   ... 13 Next

sponsored resources