InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Threat Detection & Response Tools: What Do All Those IR Buzzwords Mean?

Presented by

Ofer Maor, Co-Founder and Chief Technology Officer

About this talk

Most of us have heard lots of different buzzwords, all falling broadly into the incident response market. In this webinar, Ofer Maor, co-founder and CTO at Mitiga, will walk through terminology, technologies, and history of incident response and monitoring. There are a lot of different solutions encompassed in the term “incident response” — so what do you need to understand about the different threat detection and response tools and technologies? Covering where it started, where we are now, and how these different tools help manage incidents large and small, this webinar covers the basics you need to know about where these tools fit into your critical incident response plans. Join this 30-minute webinar to learn more about these security buzzwords, what the tools are, and how they fit together: * Security Information and Event Management (SIEM) & Security Operations Centers (SOC) * Security Orchestration, Automation, and Response (SOAR) * Endpoint Detection and Response (EDR) & Endpoint Protection Platform (EPP) * Extended Detection and Response (XDR) * Managed Security Service Provider (MSSP) & Managed Detection and Response (MDR)
Mitiga | Cloud Incident Readiness & Response

Mitiga | Cloud Incident Readiness & Response

1605 subscribers17 talks
Stay informed on the latest cloud threats and investigation techniques
Mitiga provides organizations worldwide with continuous, proactive breach investigation, lowers the impact of cyber breaches, and optimizes readiness for critical cloud and hybrid incidents. Learn from our experience with real-world cloud attacks and responses, research into evolving cloud threats, and growing cloud attack scenario library
Related topics