[Cloud Computing]Mechanisms: Endpoint Threat Detection and Response

Endpoint Threat Detection and Response


Endpoint security refers to the protection of an organization's network when accessed via remote devices such as laptops or other wireless and mobile devices. Endpoint threat detection and response (ETDR) focuses on the endpoint as opposed to the network, threats as opposed to only malware, and officially declares incidents. It contains a collection of tools used for both detection and incident response. A mobile endpoint may use multiple methods and protocols to connect to cloud services and applications, while a fixed endpoint commonly uses one method and protocol to connect to cloud services and applications.

Figure 1 shows ETDRs being queued by a threat intelligence system.


Figure 1 - ETDR in the context of a threat intelligence system.

Advanced threats and zero-day attacks require organizations to detect and respond based on realtime monitoring and a continuous recorded history to reduce the attack surface with multiple forms of prevention. The ETDR strategy is to deploy sensors that cross network and endpoint boundaries. The architecture requires that the endpoint platforms' security, secure boot processes, and encryption key protections are in place.

Related Patterns:

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值