SlideShare uma empresa Scribd logo
1 de 35
Baixar para ler offline
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Steve Brasen
Research Director
Enterprise Management Associates
Identifying Effective Endpoint
Detection and Response Platforms
(EDRP)
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Watch the On-Demand Webinar
Slide 2 © 2018 Enterprise Management Associates, Inc.
• Identifying Effective Endpoint Detection and Response
Platforms (EDRP) On-Demand webinar is available here:
https://ema.wistia.com/medias/u9sjzl50hj
• Check out upcoming webinars from EMA here:
http://www.enterprisemanagement.com/freeResearch
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Featured Speaker
Steve Brasen, Managing Research Director, EMA
Steve's career at EMA follows 20+ years of “in-the-trenches”
experience in IT systems support, engineering, and management for
high-technology, telecommunications, and financial
institutions. Steve's primary focus area at EMA is on endpoint
management topics including enterprise mobile management, client
lifecycle management, desktop virtualization, and workspace
management
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Logistics
An archived version of the event recording will be
available at www.enterprisemanagement.com
• Log questions in the chat panel located on the lower
left-hand corner of your screen
• Questions will be addressed during the Q&A session
of the event
QUESTIONS
EVENT RECORDING
A PDF of the speaker slides will be distributed
to all attendees
PDF SLIDES
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Steve Brasen
Research Director
Enterprise Management Associates
Identifying Effective Endpoint
Detection and Response Platforms
(EDRP)
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Agenda
Slide 6 © 2018 Enterprise Management Associates, Inc.
• The Evolving State of Endpoint
Management
• Understanding Endpoint Detection
and Response
• Research and Methodology
• Evaluating EDRP Platforms: Tanium
Core vs. 1E Tachyon
• Conclusions
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Emerging Endpoint Management Requirements
• Today’s business success is
dependent on the secure delivery of IT
services
• Workforces are demanding
unprecedented access to business
resources from any device at any
location
• Enterprise IT managers are
responsible for ensuring:
• The performance, reliability, and
availability of enterprise IT resources
• The enforcement of security controls
• Support for end user productivity and
positive work experiences
Slide 7 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Emerging Endpoint Management Requirements
• 95% of Businesses Must Meet Regulatory Compliance Requirements
Slide 8 © 2018 Enterprise Management Associates, Inc.
• COBIT
• CPNI
• GDPR
• GLB
• HIPAA
• HITECH
• PCI
• SAS-70
• Six Sigma
• SOX
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Emerging Endpoint Management Requirements
• EMA primary research indicates ensuring the security of IT services is…
• …the most difficult…
• …the most time-consuming…
• …the most expensive…
• …the most business-impacting…
…IT management process organizations must support today!
Slide 9 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
The Evolving Threat Landscape
• Attacks are escalating!
• Major security breaches have occurred in even the
largest of businesses
• Failure to secure sensitive business IT
applications, data, and services may result in:
• Placing customers and employees at risk of identity
fraud
• A loss of business reputation
• Decreased profitability and customer base
• An inability to meet regulatory commitments
• Fines, lawsuit payments, and other compensation to
affected users
Slide 10 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
The Evolving Threat Landscape
• The new age of malware attacks
• Evasive malware
• Attacks are becoming targeted
• Malware as a Service
• The proliferation of ransomware
• WannaCry
• Petya
• Locki
• Bad Rabbit
Slide 11 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
The Evolving Threat Landscape
• Signature-based malware protection is
no longer effective
• Requires frequent endpoint updates
 Vulnerable to zero-day attacks
• Unable to reliably distinguish legitimate
content from malware
 It is difficult to create signatures for
polymorphic or encrypted code segments
 Hacker are able to evade static signature
detection techniques by coding the virus to
dynamically change its signature
• Only recognizes known threats
 This is reactive management
Slide 12 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Enabling Proactive Endpoint Security
• REACTIVE endpoint security is costly
• Administrators spend the bulk of their
time “firefighting”
• Compromised systems take time to
remediate, reducing workforce
productivity
• Multiple costly tools are necessary to
remediate breach events
Slide 13 © 2018 Enterprise Management Associates, Inc.
• A responsible approach to endpoint security is PROACTIVE
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Understanding Endpoint Detection and Response
• Endpoint management and
security processes must identify
and remediate problems and
breaches in real time
• This require continuous visibility
into endpoint conditions
Slide 14 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Understanding Endpoint Detection and Response
• Endpoint Detection and
Response (EDR) solutions
continuously monitor and
record the status and events
on supported endpoint devices
Slide 15 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Understanding Endpoint Detection and Response
• Analytics are applied to the captured information either directly
on the endpoints or after it has been collected in a centralized
data repository
Slide 16 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
EMA Research and Methodology
• To help organization understand
how to identify an effective EDR
solution, EMA has conducted
independent and objective
research on the features and
capabilities of two of the leading
solution suites in this market:
• Tanium Core
• 1E Tachyon
Slide 17 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
EMA Research and Methodology
• EMA EDR Platform Evaluation Process
• Develop list of EDR solution requirements and most valuable
characteristics
Slide 18 © 2018 Enterprise Management Associates, Inc.
VALUE
• Submit questionnaire to target
vendors
• Vet all responses to ensure
accuracy
• Record detailed results in a
research report
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
EMA Research and Methodology
• All features must be generally
available with the solution at the
time of the evaluation
• All features must be self-contained
within the included package sets
• All reported features must be
clearly documented in publicly
available resources
Slide 19 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
EMA Research and Methodology
Slide 20 © 2018 Enterprise Management Associates, Inc.
• Evaluation Key
 ○ 
Included with
the Platform
Partially
included with
the platform
Not included in
the platform
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Tanium Core vs. 1E Tachyon
• Server Architecture
Slide 21 © 2018 Enterprise Management Associates, Inc.
1E TachyonTanium
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Tanium Core vs. 1E Tachyon
• Endpoint Onboarding and Connectivity
Slide 22 © 2018 Enterprise Management Associates, Inc.
1E TachyonTanium
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Tanium Core vs. 1E Tachyon
• Tanium Endpoint Connectivity
• Peer-to-peer (P2P) connections
• Relies on low-friction endpoint
chains on a LAN to communicate
instructions and results
• Endpoint chains may consist of up
to 100 peers
• Only chain leaders communicate
with the Tanium service over the
WAN or Internet
• Endpoints are “fixed” to LANs
Slide 23 © 2018 Enterprise Management Associates, Inc.
Tanium Server
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Tanium Core vs. 1E Tachyon
• 1E Tachyon Endpoint Connectivity
• One-to-one (1:1) connections
• A dedicated “switch” continuously
routes communication traffic
between the server and as many
as 50,000 endpoints
• Endpoints may be located on or
roam between any local or remote
LAN
Slide 24 © 2018 Enterprise Management Associates, Inc.
Tachyon Server
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Tanium Core vs. 1E Tachyon
• Supported Endpoints
Slide 25 © 2018 Enterprise Management Associates, Inc.
1E TachyonTanium
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Tanium Core vs. 1E Tachyon
• Supported Endpoints
Slide 26 © 2018 Enterprise Management Associates, Inc.
1E TachyonTanium
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Tanium Core vs. 1E Tachyon
• Security and Compliance
Slide 27 © 2018 Enterprise Management Associates, Inc.
1E TachyonTanium
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Tanium Core vs. 1E Tachyon
• Security and Compliance
Slide 28 © 2018 Enterprise Management Associates, Inc.
Tanium 1E Tachyon
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Tanium Core vs. 1E Tachyon
• Security and Compliance
Slide 29 © 2018 Enterprise Management Associates, Inc.
1E TachyonTanium
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Tanium Core vs. 1E Tachyon
• Service Management and Automation
Slide 30 © 2018 Enterprise Management Associates, Inc.
1E TachyonTanium
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Tanium Core vs. 1E Tachyon
• Service Management and Automation
Slide 31 © 2018 Enterprise Management Associates, Inc.
1E TachyonTanium
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Tanium Core vs. 1E Tachyon
• Integrations
Slide 32 © 2018 Enterprise Management Associates, Inc.
1E TachyonTanium
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Tanium Core vs. 1E Tachyon
• Maintenance and Support Services
Slide 33 © 2018 Enterprise Management Associates, Inc.
1E TachyonTanium
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Conclusions
• Endpoint detection and response solutions
are essential to ensuring the rapid
identification of problems and security
breaches
• EMA recommends organizations carefully
identifying their unique requirements to
determine optimal solutions
• EMA’s evaluation of the two leading
solutions indicates 1E Tachyon offers
greater flexibility and broader support than
Tanium at lower deployment costs for most
implementations
Slide 34 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Question and Answer:
Please log Questions in the Q&A Panel
Check out this new white paper!
https://www.1e.com/resources/report/c
omparison-tanium-core-1e-tachyon/
Slide 35 © 2018 Enterprise Management Associates, Inc.

Mais conteúdo relacionado

Mais procurados

PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementasherad
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligenceseadeloitte
 
Introduction to QRadar
Introduction to QRadarIntroduction to QRadar
Introduction to QRadarPencilData
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyFidelis Cybersecurity
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceAndreas Sfakianakis
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesLiberteks
 
When and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterWhen and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterKomand
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingSplunk
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centersBrencil Kaimba
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMEAlienVault
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 

Mais procurados (20)

PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Introduction to QRadar
Introduction to QRadarIntroduction to QRadar
Introduction to QRadar
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for Dummies
 
When and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterWhen and How to Set up a Security Operations Center
When and How to Set up a Security Operations Center
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Application Security
Application SecurityApplication Security
Application Security
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 

Semelhante a Identifying Effective Endpoint Detection and Response Platforms (EDRP)

Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...Enterprise Management Associates
 
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...Enterprise Management Associates
 
EMA Radar™ for Enterprise Hybrid Infrastructure Management
EMA Radar™ for Enterprise Hybrid Infrastructure Management EMA Radar™ for Enterprise Hybrid Infrastructure Management
EMA Radar™ for Enterprise Hybrid Infrastructure Management Enterprise Management Associates
 
Strategies for Enterprise Grade Azure-based Analytics
Strategies for Enterprise Grade Azure-based AnalyticsStrategies for Enterprise Grade Azure-based Analytics
Strategies for Enterprise Grade Azure-based AnalyticsCloudera, Inc.
 
Looking Before You Leap into the Cloud: A proactive approach to machine learn...
Looking Before You Leap into the Cloud: A proactive approach to machine learn...Looking Before You Leap into the Cloud: A proactive approach to machine learn...
Looking Before You Leap into the Cloud: A proactive approach to machine learn...Enterprise Management Associates
 
Actionable Guidance to Succeed in Enterprise-Class Privileged Access Management
Actionable Guidance to Succeed in Enterprise-Class Privileged Access ManagementActionable Guidance to Succeed in Enterprise-Class Privileged Access Management
Actionable Guidance to Succeed in Enterprise-Class Privileged Access ManagementEnterprise Management Associates
 
Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...
Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...
Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...Enterprise Management Associates
 
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management SolutionTop 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management SolutionEnterprise Management Associates
 
AIOps, IT Analytics, and Business Performance: What’s Needed and What Works
AIOps, IT Analytics, and Business Performance: What’s Needed and What Works AIOps, IT Analytics, and Business Performance: What’s Needed and What Works
AIOps, IT Analytics, and Business Performance: What’s Needed and What Works Enterprise Management Associates
 
Event-driven Business: How Leading Companies are Adopting Streaming Strategies
Event-driven Business: How Leading Companies are Adopting Streaming StrategiesEvent-driven Business: How Leading Companies are Adopting Streaming Strategies
Event-driven Business: How Leading Companies are Adopting Streaming StrategiesEnterprise Management Associates
 
Inventory and Discovery: How to Take Charge of “What’s Out There”
Inventory and Discovery: How to Take Charge of “What’s Out There” Inventory and Discovery: How to Take Charge of “What’s Out There”
Inventory and Discovery: How to Take Charge of “What’s Out There” Enterprise Management Associates
 
Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...
Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...
Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...Enterprise Management Associates
 
Responsible User Empowerment: Enabling Privileged Access Management
Responsible User Empowerment: Enabling Privileged Access ManagementResponsible User Empowerment: Enabling Privileged Access Management
Responsible User Empowerment: Enabling Privileged Access ManagementEnterprise Management Associates
 
Automating Service Management: Decision Making for the Digital Age
Automating Service Management: Decision Making for the Digital Age Automating Service Management: Decision Making for the Digital Age
Automating Service Management: Decision Making for the Digital Age Enterprise Management Associates
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Enterprise Management Associates
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 
6 Principles of Modern Change Data Capture: How to Build Fast, Agile, Reliabl...
6 Principles of Modern Change Data Capture: How to Build Fast, Agile, Reliabl...6 Principles of Modern Change Data Capture: How to Build Fast, Agile, Reliabl...
6 Principles of Modern Change Data Capture: How to Build Fast, Agile, Reliabl...Enterprise Management Associates
 
AIOps and IT Analytics at the Crossroads: What’s Real Today and What’s Needed...
AIOps and IT Analytics at the Crossroads: What’s Real Today and What’s Needed...AIOps and IT Analytics at the Crossroads: What’s Real Today and What’s Needed...
AIOps and IT Analytics at the Crossroads: What’s Real Today and What’s Needed...Enterprise Management Associates
 

Semelhante a Identifying Effective Endpoint Detection and Response Platforms (EDRP) (20)

Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
 
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
 
Navigating Modern Endpoint Management Complexities
Navigating Modern Endpoint Management ComplexitiesNavigating Modern Endpoint Management Complexities
Navigating Modern Endpoint Management Complexities
 
EMA Radar™ for Enterprise Hybrid Infrastructure Management
EMA Radar™ for Enterprise Hybrid Infrastructure Management EMA Radar™ for Enterprise Hybrid Infrastructure Management
EMA Radar™ for Enterprise Hybrid Infrastructure Management
 
Strategies for Enterprise Grade Azure-based Analytics
Strategies for Enterprise Grade Azure-based AnalyticsStrategies for Enterprise Grade Azure-based Analytics
Strategies for Enterprise Grade Azure-based Analytics
 
Looking Before You Leap into the Cloud: A proactive approach to machine learn...
Looking Before You Leap into the Cloud: A proactive approach to machine learn...Looking Before You Leap into the Cloud: A proactive approach to machine learn...
Looking Before You Leap into the Cloud: A proactive approach to machine learn...
 
Actionable Guidance to Succeed in Enterprise-Class Privileged Access Management
Actionable Guidance to Succeed in Enterprise-Class Privileged Access ManagementActionable Guidance to Succeed in Enterprise-Class Privileged Access Management
Actionable Guidance to Succeed in Enterprise-Class Privileged Access Management
 
Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...
Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...
Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...
 
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management SolutionTop 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
 
AIOps, IT Analytics, and Business Performance: What’s Needed and What Works
AIOps, IT Analytics, and Business Performance: What’s Needed and What Works AIOps, IT Analytics, and Business Performance: What’s Needed and What Works
AIOps, IT Analytics, and Business Performance: What’s Needed and What Works
 
Event-driven Business: How Leading Companies are Adopting Streaming Strategies
Event-driven Business: How Leading Companies are Adopting Streaming StrategiesEvent-driven Business: How Leading Companies are Adopting Streaming Strategies
Event-driven Business: How Leading Companies are Adopting Streaming Strategies
 
Inventory and Discovery: How to Take Charge of “What’s Out There”
Inventory and Discovery: How to Take Charge of “What’s Out There” Inventory and Discovery: How to Take Charge of “What’s Out There”
Inventory and Discovery: How to Take Charge of “What’s Out There”
 
Leveraging Streaming Data through Automation
Leveraging Streaming Data through AutomationLeveraging Streaming Data through Automation
Leveraging Streaming Data through Automation
 
Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...
Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...
Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...
 
Responsible User Empowerment: Enabling Privileged Access Management
Responsible User Empowerment: Enabling Privileged Access ManagementResponsible User Empowerment: Enabling Privileged Access Management
Responsible User Empowerment: Enabling Privileged Access Management
 
Automating Service Management: Decision Making for the Digital Age
Automating Service Management: Decision Making for the Digital Age Automating Service Management: Decision Making for the Digital Age
Automating Service Management: Decision Making for the Digital Age
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
6 Principles of Modern Change Data Capture: How to Build Fast, Agile, Reliabl...
6 Principles of Modern Change Data Capture: How to Build Fast, Agile, Reliabl...6 Principles of Modern Change Data Capture: How to Build Fast, Agile, Reliabl...
6 Principles of Modern Change Data Capture: How to Build Fast, Agile, Reliabl...
 
AIOps and IT Analytics at the Crossroads: What’s Real Today and What’s Needed...
AIOps and IT Analytics at the Crossroads: What’s Real Today and What’s Needed...AIOps and IT Analytics at the Crossroads: What’s Real Today and What’s Needed...
AIOps and IT Analytics at the Crossroads: What’s Real Today and What’s Needed...
 

Mais de Enterprise Management Associates

Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Enterprise Management Associates
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryEnterprise Management Associates
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...Enterprise Management Associates
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsEnterprise Management Associates
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...Enterprise Management Associates
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Enterprise Management Associates
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Enterprise Management Associates
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityEnterprise Management Associates
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesEnterprise Management Associates
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...Enterprise Management Associates
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Enterprise Management Associates
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Enterprise Management Associates
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Enterprise Management Associates
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessEnterprise Management Associates
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...Enterprise Management Associates
 

Mais de Enterprise Management Associates (20)

Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
 
Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 

Último (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Identifying Effective Endpoint Detection and Response Platforms (EDRP)

  • 1. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Steve Brasen Research Director Enterprise Management Associates Identifying Effective Endpoint Detection and Response Platforms (EDRP)
  • 2. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Watch the On-Demand Webinar Slide 2 © 2018 Enterprise Management Associates, Inc. • Identifying Effective Endpoint Detection and Response Platforms (EDRP) On-Demand webinar is available here: https://ema.wistia.com/medias/u9sjzl50hj • Check out upcoming webinars from EMA here: http://www.enterprisemanagement.com/freeResearch
  • 3. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Featured Speaker Steve Brasen, Managing Research Director, EMA Steve's career at EMA follows 20+ years of “in-the-trenches” experience in IT systems support, engineering, and management for high-technology, telecommunications, and financial institutions. Steve's primary focus area at EMA is on endpoint management topics including enterprise mobile management, client lifecycle management, desktop virtualization, and workspace management
  • 4. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Logistics An archived version of the event recording will be available at www.enterprisemanagement.com • Log questions in the chat panel located on the lower left-hand corner of your screen • Questions will be addressed during the Q&A session of the event QUESTIONS EVENT RECORDING A PDF of the speaker slides will be distributed to all attendees PDF SLIDES
  • 5. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Steve Brasen Research Director Enterprise Management Associates Identifying Effective Endpoint Detection and Response Platforms (EDRP)
  • 6. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Agenda Slide 6 © 2018 Enterprise Management Associates, Inc. • The Evolving State of Endpoint Management • Understanding Endpoint Detection and Response • Research and Methodology • Evaluating EDRP Platforms: Tanium Core vs. 1E Tachyon • Conclusions
  • 7. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Emerging Endpoint Management Requirements • Today’s business success is dependent on the secure delivery of IT services • Workforces are demanding unprecedented access to business resources from any device at any location • Enterprise IT managers are responsible for ensuring: • The performance, reliability, and availability of enterprise IT resources • The enforcement of security controls • Support for end user productivity and positive work experiences Slide 7 © 2018 Enterprise Management Associates, Inc.
  • 8. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Emerging Endpoint Management Requirements • 95% of Businesses Must Meet Regulatory Compliance Requirements Slide 8 © 2018 Enterprise Management Associates, Inc. • COBIT • CPNI • GDPR • GLB • HIPAA • HITECH • PCI • SAS-70 • Six Sigma • SOX
  • 9. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Emerging Endpoint Management Requirements • EMA primary research indicates ensuring the security of IT services is… • …the most difficult… • …the most time-consuming… • …the most expensive… • …the most business-impacting… …IT management process organizations must support today! Slide 9 © 2018 Enterprise Management Associates, Inc.
  • 10. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING The Evolving Threat Landscape • Attacks are escalating! • Major security breaches have occurred in even the largest of businesses • Failure to secure sensitive business IT applications, data, and services may result in: • Placing customers and employees at risk of identity fraud • A loss of business reputation • Decreased profitability and customer base • An inability to meet regulatory commitments • Fines, lawsuit payments, and other compensation to affected users Slide 10 © 2018 Enterprise Management Associates, Inc.
  • 11. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING The Evolving Threat Landscape • The new age of malware attacks • Evasive malware • Attacks are becoming targeted • Malware as a Service • The proliferation of ransomware • WannaCry • Petya • Locki • Bad Rabbit Slide 11 © 2018 Enterprise Management Associates, Inc.
  • 12. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING The Evolving Threat Landscape • Signature-based malware protection is no longer effective • Requires frequent endpoint updates  Vulnerable to zero-day attacks • Unable to reliably distinguish legitimate content from malware  It is difficult to create signatures for polymorphic or encrypted code segments  Hacker are able to evade static signature detection techniques by coding the virus to dynamically change its signature • Only recognizes known threats  This is reactive management Slide 12 © 2018 Enterprise Management Associates, Inc.
  • 13. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Enabling Proactive Endpoint Security • REACTIVE endpoint security is costly • Administrators spend the bulk of their time “firefighting” • Compromised systems take time to remediate, reducing workforce productivity • Multiple costly tools are necessary to remediate breach events Slide 13 © 2018 Enterprise Management Associates, Inc. • A responsible approach to endpoint security is PROACTIVE
  • 14. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Understanding Endpoint Detection and Response • Endpoint management and security processes must identify and remediate problems and breaches in real time • This require continuous visibility into endpoint conditions Slide 14 © 2018 Enterprise Management Associates, Inc.
  • 15. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Understanding Endpoint Detection and Response • Endpoint Detection and Response (EDR) solutions continuously monitor and record the status and events on supported endpoint devices Slide 15 © 2018 Enterprise Management Associates, Inc.
  • 16. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Understanding Endpoint Detection and Response • Analytics are applied to the captured information either directly on the endpoints or after it has been collected in a centralized data repository Slide 16 © 2018 Enterprise Management Associates, Inc.
  • 17. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING EMA Research and Methodology • To help organization understand how to identify an effective EDR solution, EMA has conducted independent and objective research on the features and capabilities of two of the leading solution suites in this market: • Tanium Core • 1E Tachyon Slide 17 © 2018 Enterprise Management Associates, Inc.
  • 18. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING EMA Research and Methodology • EMA EDR Platform Evaluation Process • Develop list of EDR solution requirements and most valuable characteristics Slide 18 © 2018 Enterprise Management Associates, Inc. VALUE • Submit questionnaire to target vendors • Vet all responses to ensure accuracy • Record detailed results in a research report
  • 19. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING EMA Research and Methodology • All features must be generally available with the solution at the time of the evaluation • All features must be self-contained within the included package sets • All reported features must be clearly documented in publicly available resources Slide 19 © 2018 Enterprise Management Associates, Inc.
  • 20. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING EMA Research and Methodology Slide 20 © 2018 Enterprise Management Associates, Inc. • Evaluation Key  ○  Included with the Platform Partially included with the platform Not included in the platform
  • 21. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Tanium Core vs. 1E Tachyon • Server Architecture Slide 21 © 2018 Enterprise Management Associates, Inc. 1E TachyonTanium
  • 22. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Tanium Core vs. 1E Tachyon • Endpoint Onboarding and Connectivity Slide 22 © 2018 Enterprise Management Associates, Inc. 1E TachyonTanium
  • 23. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Tanium Core vs. 1E Tachyon • Tanium Endpoint Connectivity • Peer-to-peer (P2P) connections • Relies on low-friction endpoint chains on a LAN to communicate instructions and results • Endpoint chains may consist of up to 100 peers • Only chain leaders communicate with the Tanium service over the WAN or Internet • Endpoints are “fixed” to LANs Slide 23 © 2018 Enterprise Management Associates, Inc. Tanium Server
  • 24. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Tanium Core vs. 1E Tachyon • 1E Tachyon Endpoint Connectivity • One-to-one (1:1) connections • A dedicated “switch” continuously routes communication traffic between the server and as many as 50,000 endpoints • Endpoints may be located on or roam between any local or remote LAN Slide 24 © 2018 Enterprise Management Associates, Inc. Tachyon Server
  • 25. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Tanium Core vs. 1E Tachyon • Supported Endpoints Slide 25 © 2018 Enterprise Management Associates, Inc. 1E TachyonTanium
  • 26. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Tanium Core vs. 1E Tachyon • Supported Endpoints Slide 26 © 2018 Enterprise Management Associates, Inc. 1E TachyonTanium
  • 27. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Tanium Core vs. 1E Tachyon • Security and Compliance Slide 27 © 2018 Enterprise Management Associates, Inc. 1E TachyonTanium
  • 28. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Tanium Core vs. 1E Tachyon • Security and Compliance Slide 28 © 2018 Enterprise Management Associates, Inc. Tanium 1E Tachyon
  • 29. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Tanium Core vs. 1E Tachyon • Security and Compliance Slide 29 © 2018 Enterprise Management Associates, Inc. 1E TachyonTanium
  • 30. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Tanium Core vs. 1E Tachyon • Service Management and Automation Slide 30 © 2018 Enterprise Management Associates, Inc. 1E TachyonTanium
  • 31. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Tanium Core vs. 1E Tachyon • Service Management and Automation Slide 31 © 2018 Enterprise Management Associates, Inc. 1E TachyonTanium
  • 32. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Tanium Core vs. 1E Tachyon • Integrations Slide 32 © 2018 Enterprise Management Associates, Inc. 1E TachyonTanium
  • 33. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Tanium Core vs. 1E Tachyon • Maintenance and Support Services Slide 33 © 2018 Enterprise Management Associates, Inc. 1E TachyonTanium
  • 34. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Conclusions • Endpoint detection and response solutions are essential to ensuring the rapid identification of problems and security breaches • EMA recommends organizations carefully identifying their unique requirements to determine optimal solutions • EMA’s evaluation of the two leading solutions indicates 1E Tachyon offers greater flexibility and broader support than Tanium at lower deployment costs for most implementations Slide 34 © 2018 Enterprise Management Associates, Inc.
  • 35. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Question and Answer: Please log Questions in the Q&A Panel Check out this new white paper! https://www.1e.com/resources/report/c omparison-tanium-core-1e-tachyon/ Slide 35 © 2018 Enterprise Management Associates, Inc.