Endpoint Detection and Response (EDR) is a technology used to protect endpoints, which are computer hardware devices, from threat. Creators of the EDR technology-based platforms deploy tools to gather data from endpoint devices, and then analyze the data to reveal potential cyber threats and issues. It is a protection against hacking attempts and stealing of user data.
Key Capabilities of Endpoint Detection and Response (EDR) Platforms
The software is installed on the end-user device and it is continually monitored. The data is stored in a centralized database. In an incident when a threat is found, the end-user is immediately prompted with a preventive list of actions. Every EDR platform has a unique set of capabilities.
However, some common capabilities include the monitoring of endpoints in both the online and offline mode, responding to threats in real-time, increasing visibility and transparency of user data, detecting store endpoint events and malware injections, creating blacklists and whitelist, and integration with other technologies.
Browse our Featured Solutions
Allocate Flexible & Varying Resources through optimized Data Centre Utilisation.
Endpoint Threat Detection
Collecting all data and devices at the endpoint that prompt threat or any other behavioral changes.
Identifying Threat Patterns
Detecting Behavioral Changes and performing a collective analysis to identify the threat through a specific pattern.
Automatic
Response
Automatic Response enables the EDR to react to the categorized threats and mitigate it.