Live Demo: Reactive Capabilities of Fidelis Elevate XDR

Logo
Presented by

Chuck Burley, Security Engineer

About this talk

Breaches Happen, What You Need to Automate Post Breach Detection & Response Threat actors are constantly adapting their tactics, techniques and procedures to evade preventive defenses and as a result, consideration of detection and response capabilities has never been more vital. Reactive countermeasures include techniques to prevent attacks from succeeding in real time, including signature detection to quarantine known-bad files at the endpoint; behavior analysis to kill a process at the endpoint; network session disruption upon detection of files and network behaviors; and email quarantine Join Chuck Burley, Security Engineer, Fidelis Cybersecurity for a demo of Fidelis Endpoint and find out how to: Using Playbooks to automate post-breach detection and response Leverage behavioral indicators to isolate an infected endpoint Kill Processes that will spread the infection
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (56)
Subscribers (9291)
Security tactics for elite security professionals. We help security teams actively defend their organizations with best practices and expert knowledge on threat hunting, threat intelligence and detection & response.