NEW TECH: Trend Micro inserts ‘X’ factor into ‘EDR’ – endpoint detection and response
The Last Watchdog
AUGUST 14, 2019
Once inside, attacks increasingly deploy so-called ‘fileless” attacks , that come and go only when a certain compromised piece of software – or firmware — is opened in memory. More data had to be collected, stored and analyzed, ideally by experienced analysts. But, of course, EDR also raised fresh challenges.
Let's personalize your content