Blog

Key Program Metrics of Endpoint Detection and Response (EDR)

An emerging technology, Endpoint Detection and Response (EDR) constitutes a set of tools and solutions that enterprises use to detect, investigate and mitigate suspicious activities on hosts and endpoints. The term was originally called as Endpoint Threat Detection and Response (ETDR) but it is more popular as EDR. Key Program Metrics: Level of visibility the… Read More »Key Program Metrics of Endpoint Detection and Response (EDR)

Key Program Metrics of Distributed denial-of-service (DDoS)

Distributed denial-of-service (DDoS) attack is one in which a multiple sources attack a single target causing denial of service for legitimate users of the targeted system. The flood of incoming traffic totally overwhelms the system, hence denying service to legitimate users. Key Program Metrics: Loss percentage : number of packets or bytes lost due to the interaction… Read More »Key Program Metrics of Distributed denial-of-service (DDoS)

Key Program Metrics of Network Advanced Threat Protection

Advanced Threat Protection (ATP) is used to protect against sophisticated, highly skilled, well funded and motivated threat actor . The solution uncovers advance threats across Endpoints, Network, Email and Cloud. These solutions are used to detect advanced persistent threats that existing controls are not able to detect or are simply not capable of doing it.… Read More »Key Program Metrics of Network Advanced Threat Protection

Key Program Metrics of Vulnerability Assessment

Vulnerability assessment is a process that defines, identifies, and classifies the security holes in a computer, network, or communications infrastructure. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use. Vulnerability management program addresses the inherent problem associated with vulnerable software programs. These… Read More »Key Program Metrics of Vulnerability Assessment