Webinar Series:
Cybersecurity Best Practices
Limitations of EDR
Date: Thursday, February 23 at 11:00am PT / 2:00pm EST
Presenters: Jeff Teitelbaum (Sr. Technical Support Engineer) & Daniel Eickhoff (Director of Sales)
We will discuss:
- Scope: While EDR protects the end points, MXDR provides visibility across all vectors, including workstations and servers, network and security devices, email, cloud apps, and user behavior.
- EDR requires an in-house team to investigate alerts and analyze threats. A common problem is “alert fatigue” as well as limited IT resources not having the bandwidth or the expertise to manage the solution.
- Integration and automation, and unified data collection and correlation across EDR and other vectors within your Cybersecurity Posture, including but not limited to Firewall appliances and network switches
- Limited visibility: EDR does not provide visibility into network traffic to detect the Lateral Movement of threat actors
- Threat Hunting: Unlike EDR solutions, MXDR solutions can combine and correlate data from various sources for more holistic coverage
- EDR is effective at detecting known threats or threats from known actors. A platform utilizing AI and machine-learning can detect zero-day threats based on anomalies in network traffic or user behavior.
- EDR is a reactive approach. Proactive solutions such as Vulnerability Assessments can be used to patch security flaws before they can be exploited by threat actors.
<< Back to Webinars