[Cloud Computing]Mechanisms: Endpoint Threat Detection and Response
来源:互联网 发布:爰淘宝 编辑:程序博客网 时间:2024/06/04 18:38
Endpoint Threat Detection and Response
Endpoint security refers to the protection of an organization's network when accessed via remote devices such as laptops or other wireless and mobile devices. Endpoint threat detection and response (ETDR) focuses on the endpoint as opposed to the network, threats as opposed to only malware, and officially declares incidents. It contains a collection of tools used for both detection and incident response. A mobile endpoint may use multiple methods and protocols to connect to cloud services and applications, while a fixed endpoint commonly uses one method and protocol to connect to cloud services and applications.
Figure 1 shows ETDRs being queued by a threat intelligence system.
Figure 1 - ETDR in the context of a threat intelligence system.
Advanced threats and zero-day attacks require organizations to detect and respond based on realtime monitoring and a continuous recorded history to reduce the attack surface with multiple forms of prevention. The ETDR strategy is to deploy sensors that cross network and endpoint boundaries. The architecture requires that the endpoint platforms' security, secure boot processes, and encryption key protections are in place.
Related Patterns:
- Threat Intelligence Processing
- [Cloud Computing]Mechanisms: Endpoint Threat Detection and Response
- [Cloud Computing]Mechanisms: Threat Intelligence System
- [Cloud Computing]Mechanisms: Intrusion Detection and Prevention Systems
- [Cloud Computing]Mechanisms: Identity and Access Management
- [Cloud Computing]Mechanisms: Import and Export
- [Cloud Computing]Mechanisms: Certificate
- [Cloud Computing]Mechanisms: Encryption
- [Cloud Computing]Mechanisms: Geotag
- [Cloud Computing]Mechanisms: Honeypot
- [Cloud Computing]Mechanisms: Hypervisor
- [Cloud Computing]Mechanisms: Sandbox
- [Cloud Computing]Mechanisms: Attestation Service
- [Cloud Computing]Mechanisms: Attribute Authority
- [Cloud Computing]Mechanisms: Audit Monitor
- [Cloud Computing]Mechanisms: Certificate Authority
- [Cloud Computing]Mechanisms: Data Transport
- [Cloud Computing]Mechanisms: Digital Signature
- [Cloud Computing]Mechanisms: Failover System
- 数字反转(升级版)
- 解释器模式 详解
- 下拉列表小例子
- rabbitmq 消息确认机制
- numpy module 1 -- Numpy tutorial
- [Cloud Computing]Mechanisms: Endpoint Threat Detection and Response
- 最少硬币问题
- 返回数组最大值
- 排序
- thymeleaf 学习笔记
- php实现session入库操作例子
- 京东首页小例子
- Ubuntu录制gif动态图
- Java集合之Hashtable<K,V>,TreeMap<K,V>,HashMap<K,V>自动排序