Carbon Black : Endpoint Detection Response that augments existing security tools

Posted: 27th Jun 2022

Technimove had created the ‘Science of Cyber Security & Cyber Resilience Periodic Table’ to help enterprises fully understand the threat landscape and assist them in providing end-to-end value that protects businesses and hardens their security posture whilst mitigating risk. This content covered everything from the technologies that can be deployed, the major cyber security frameworks, governance & best practice, typical types of attack, DevSecOps & resilience.

 

Cyber Security consists of technologies such as; Next-Generation Firewalls (NGFW), Data Loss Prevention (DLP), Phishing Defence, Endpoint Detection Response (EDR) - Carbon Black, Threat Detection, Identity Access Management (IAM), Privileged Access Management (PAM), Threat Intelligence, User Entity Behaviour Analysis (UEBA), Network Access Control (NAC), Security Incident Event Management (SIEM), Micro-Segmentation and so much more. Defence in Depth is the industry term for taking a layered technology approach to cyber security, but the foundational principles of security are built on people, processes & policies. To undertake a complete end-to-end approach to hardening a business’s security posture, we must also take into consideration, governance, compliance, controls and cyber security framework controls and approaches.

 

Technimove is trying to educate its customers on how Carbon Black delivers intelligent security that can be managed internally or full outsourced which removes the overhead on security analysts.

View Full Article

Related Articles

Popular Articles

InfiniSafe is revolutionizing cyber storage resilience and taking it to the next level! Uncover the ...
The pandemic taught us all how to work differently. This includes call centers, which have had to ad...
The adoption of cloud productivity suites has been driven by the dramatic acceleration of digital tr...
For most organisations, traditional on-premises data centre infrastructures consist of compute, stor...