
Detection of attacks and compromises
from EDR/XDR to Deception to MDR, SIEM and SOC services
Topic
Cloud SecurityData security / DLP / Know-how protectionEndpoint ProtectionManaged Security Services / HostingNetwork Security / Patch ManagementSIEM / Threat Analytics / SOC
When & Where
Details
Format:
Workshop
Language:
German
Session description
Detecting successful intrusions into one's own IT infrastructure is becoming increasingly important and is also increasingly required by new legal requirements.
Buzzwords such as EDR, XDR, NDR, MDR, SASE, Deception, SOC, and many more describe technical solutions or services from service providers that compete for customer budgets but can sometimes also complement each other effectively.
This deep dive session classifies the terms, describes their capabilities and limitations, as well as the market and relevant providers. It provides the fundamentals for developing meaningful concepts and selecting suitable offerings.
Buzzwords such as EDR, XDR, NDR, MDR, SASE, Deception, SOC, and many more describe technical solutions or services from service providers that compete for customer budgets but can sometimes also complement each other effectively.
This deep dive session classifies the terms, describes their capabilities and limitations, as well as the market and relevant providers. It provides the fundamentals for developing meaningful concepts and selecting suitable offerings.
Sponsored by