Honestly, if they had a university, all the students would be geniuses. Easy to understand videos . Wish I could be part of the great team, even if it’s fully remote work 👏🏻 👏🏻
Lots of praise in the comments, however I'm not seeing a big difference between EDR, as described in this video, and traditional centrally managed antivirus, anti-malware detection that includes both heuristic and signature based scheduled and real-time scanning. It sounds more like a marketing repackaging to me, but perhaps I'm missing something.
So... as part of preventing backdoors on your network, you place a backdoor on every device that gathers data even when not connected? ...so the number one approach attackers will take is hijacking those very same agents and or emulating their characteristics to blend right in. Now everyone expects their devices to be compromised and weird activity is no longer a red flag because that weird is the new normal. This isn't sounding too good so far and there's still a lot of video to go.
Oh, ... and you want them invisible to the OS? LMAO, at this point you are the threat and your employees should flee as soon as possible because they work in a dystopian nightmare where invisible backdoors are lauded as good. If you're going to watch me, I should be able to watch you watching me.
Honestly, if they had a university, all the students would be geniuses. Easy to understand videos . Wish I could be part of the great team, even if it’s fully remote work 👏🏻 👏🏻
Love the style and clarity. And your own interpretation of it is what makes it unique
Agreed. It also comes with a thorough understanding of the subject matter.
The explanation is straightforward from here on out.
A concise and easy-to-understand discussion of EDR!
Excellent video with nice explanation. Is it possible to give a video about Carbon Black EDR for Cloud.Thank you.
What is network contain & how to know what EDR is network contain or not?
I need Working knowledge of Crowdstrike or comparable EDR , where can i find it
Lots of praise in the comments, however I'm not seeing a big difference between EDR, as described in this video, and traditional centrally managed antivirus, anti-malware detection that includes both heuristic and signature based scheduled and real-time scanning. It sounds more like a marketing repackaging to me, but perhaps I'm missing something.
Great video! Thank you!
Thank you brother, it is clear and easy to understand information ❤
Lovely explanation
great video!
Excellent. Thank you
Bartell Plains
Maci Road
Herbert Lodge
🤔actually there is no point if you think with all details
Turner Highway
Luella Ridges
Howard Tunnel
Reinger Pine
30289 Conn Mount
McLaughlin Mountain
Abdiel Via
291 Tina Neck
23455 Zemlak Island
So... as part of preventing backdoors on your network, you place a backdoor on every device that gathers data even when not connected? ...so the number one approach attackers will take is hijacking those very same agents and or emulating their characteristics to blend right in. Now everyone expects their devices to be compromised and weird activity is no longer a red flag because that weird is the new normal. This isn't sounding too good so far and there's still a lot of video to go.
Oh, ... and you want them invisible to the OS? LMAO, at this point you are the threat and your employees should flee as soon as possible because they work in a dystopian nightmare where invisible backdoors are lauded as good. If you're going to watch me, I should be able to watch you watching me.
And you want them to use AI... this is a recipe for disaster. False positives on this are going to destroy people's careers. Mark my words.
965
Intern talking like an old pro.
bro is the definition of "posh"
533