{"id":10423,"date":"2021-05-25T10:01:45","date_gmt":"2021-05-25T08:01:45","guid":{"rendered":"https:\/\/www.sertalink.com\/?page_id=10423"},"modified":"2021-05-25T10:01:46","modified_gmt":"2021-05-25T08:01:46","slug":"symantec-endpoint-detection-and-response-2","status":"publish","type":"page","link":"https:\/\/sertalink.com\/nl\/symantec-endpoint-detection-and-response-2\/","title":{"rendered":"Symantec Endpoint Detection and Response"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/07\/edr-banner.png&#8221; _builder_version=&#8221;3.24&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243;]<\/p>\n<h3 class=\" textproofleft\">Find attacks and stop them. Fast.<\/h3>\n<h4 class=\"symantecRed textproofleft\"><\/h4>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<\/p>\n<h4 class=\"symantecRed textproofleft\">Expose stealthy attacks with cloud-delivered analytics, threat intelligence, and 24&#215;7 managed services.<\/h4>\n<ul>\n<li>Quickly discover and resolve threats with deep endpoint visibility and superior detection analytics, reducing mean time to remediation.<\/li>\n<li>Overcome cyber security skills shortages and streamline SOC operations with extensive automation and built-in integrations for sandboxing, SIEM, and orchestration.<\/li>\n<li>Fortify security teams with the unmatched expertise and global scale of Symantec Managed Endpoint Detection and Response services.<\/li>\n<li>Roll out Endpoint Detection and Response (EDR) across Windows, macOS, and Linux devices using Symantec Endpoint Protection (SEP)-integrated EDR or a dissolvable agent.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243; module_alignment=&#8221;center&#8221; custom_margin=&#8221;|291px||auto||&#8221; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243;]<\/p>\n<div class=\"content-col content-band\">\n<div class=\"textproof parbase\">\n<div class=\"textproofclass\">\n<h3 class=\" textproofleft\">Simplify Investigations and Threat Hunting<\/h3>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"media-col content-band\">\n<div class=\"textproof parbase\">\n<div class=\"textproofclass\"><\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<\/p>\n<h4 class=\"symantecRed textproofleft\">Detect and expose attackers in your environment\u2014no new agent required.<\/h4>\n<p>Supported by deep endpoint visibility, precisely detect and actively hunt threats to quickly expose and fully resolve them, no matter how persistent.<\/p>\n<ul>\n<li>Instantly detect advanced attack methods using behavioral policies continually updated by Symantec researchers.<\/li>\n<li>Detect new attack patterns in minutes, and alert responders to attacks in progress, with analytics continuously trained by global telemetry.<\/li>\n<li>Quickly analyze attack chains and remediate impacted systems using risk-scored history of endpoint activity.<\/li>\n<li>Expose sophisticated attack tactics and techniques using MITRE ATT&amp;CK event enrichment and cyber analytics.<\/li>\n<li>Supports &#8216;zero trust&#8217; threat hunting with advanced forenics tools that use full memory scans and metadata acquisition to find injections, process hollowing, shellcode, and more.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243; module_alignment=&#8221;center&#8221; custom_margin=&#8221;|291px||auto||&#8221; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243;]<\/p>\n<h3 class=\" textproofleft\">Resolve, Remediate, and Restore Devices in Minutes<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<\/p>\n<h4 class=\"symantecRed textproofleft\">Contain and respond to threats with SEP-integrated Endpoint Detection and Response (EDR).<\/h4>\n<ul>\n<li><span class=\"symantecBlueBullet\">Investigate and contain suspicious events using advanced sandboxing, blacklisting, and quarantining.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Gain visibility into attack history by continuously recording activity, and retrieving endpoint process dumps.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Seal off potentially compromised endpoints during an investigation with endpoint isolation.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Delete malicious files and associated artifacts on all impacted endpoints, returning endpoint to its pre-infection state.<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243; module_alignment=&#8221;center&#8221; custom_margin=&#8221;|291px||auto||&#8221; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243;]<\/p>\n<h3 class=\" textproofleft\">Automate Complex Investigations and Streamline SOC Operations<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<\/p>\n<h4 class=\"symantecRed textproofleft\">Quickly initiate cyber security functions and leverage expert investigation methods with artificial intelligence-driven playbooks and pre-built integrations.<\/h4>\n<ul>\n<li>Create custom investigation flows and automate repetitive manual tasks\u2013no complex scripting required.<\/li>\n<li>Automatically sandbox suspicious files for quick conviction and blacklisting.<\/li>\n<li>Use visual graphs and alerts to simplify how security analysts work with large amounts of cyber data.<\/li>\n<li>Correlate events across endpoints, the network, and email using additional sensors.<\/li>\n<li>Streamline SOC operations and lower costs with prebuilt apps for SIEM, orchestration, and ticketing systems.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243; module_alignment=&#8221;center&#8221; custom_margin=&#8221;|291px||auto||&#8221; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243;]<\/p>\n<h3 class=\" textproofleft\">Outsource Your EDR Activities to Symantec<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<\/p>\n<h4 class=\"symantecRed textproofleft\">Skilled Symantec SOC analysts aggressively hunt, investigate, and contain threats.<\/h4>\n<ul>\n<li>Access free expert assessment via an EDR console for targeted attack triage and guidance.<\/li>\n<li>Bolster your team with dedicated, 24&#215;7 world-class SOC analysts assigned based on geography and industry.<\/li>\n<li>Minimize the business impact of an incursion with 24&#215;7 threat hunting that harnesses Symantec&#8217;s SOC Technology platform and Global Intelligence Network.<\/li>\n<li>Disrupt attacks by containing compromised endpoints via pre-authorized actions.<\/li>\n<li>Ensure shortest time to value with fast, no-cost on boarding from dedicated team.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/07\/edr-2.png&#8221; align=&#8221;center&#8221; _builder_version=&#8221;3.24&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<\/p>\n<h3 class=\" textproofleft\">Upgrade to Symantec Complete Endpoint Defense<\/h3>\n<h4 class=\"symantecRed textproofleft\">Add endpoint detection and response for broader, deeper defense for your organization. Choose a from one of our new suites, created for your specific security needs and maturity.<\/h4>\n<ul>\n<li>Build out your endpoint defense with leading prevention and hardening technologies.<\/li>\n<li>Utilize interlocking defenses at the device, the app, and the network level.<\/li>\n<li>Reduce complexity with one single agent and console.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/07\/edr-3.png&#8221; align=&#8221;center&#8221; _builder_version=&#8221;3.24&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<\/p>\n<h3 class=\" textproofleft\">Introducing Symantec Integrated Cyber Defense Exchange (ICDx)<\/h3>\n<h4 class=\"symantecRed textproofleft\">Reduce complexity and cost with built-in integrations and streamlined interoperability.<\/h4>\n<p>ICDx simplifies product integrations and accelerates customer time to value across the Symantec enterprise portfolio and the industry\u2019s largest partner ecosystem.<\/p>\n<ul>\n<li>Remove the friction for security teams when integrating Symantec and third-party products<\/li>\n<li>Enhance visibility from a unified view of events across Symantec products for searching, dashboards and reporting<\/li>\n<li>Prepare higher quality cyber data to forward to SIEM and other SOC tools enhancing analytics and alerts<\/li>\n<li>Speed responses to critical incidents with orchestrated actions targeting multiple Symantec products<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Find attacks and stop them. Fast. Expose stealthy attacks with cloud-delivered analytics, threat intelligence, and 24&#215;7 managed services. Quickly discover and resolve threats with deep endpoint visibility and superior detection analytics, reducing mean time to remediation. Overcome cyber security skills shortages and streamline SOC operations with extensive automation and built-in integrations for sandboxing, SIEM, and [&hellip;]<\/p>\n","protected":false},"author":26,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-10423","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.1.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Symantec Endpoint Detection and Response | Sertalink Belgium &amp; Luxembourg<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sertalink.com\/nl\/symantec-endpoint-detection-and-response-2\/\" \/>\n<meta property=\"og:locale\" content=\"nl_BE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Symantec Endpoint Detection and Response | Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sertalink.com\/nl\/symantec-endpoint-detection-and-response-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sertalink\/\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-25T08:01:46+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sertalink_bnlx\" \/>\n<meta name=\"twitter:site\" content=\"@sertalink_bnlx\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/sertalink.com\/nl\/#organization\",\"name\":\"Sertalink Belgium\",\"url\":\"https:\/\/sertalink.com\/nl\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/sertalink\/\",\"https:\/\/www.linkedin.com\/company\/sertalink\/\",\"https:\/\/twitter.com\/sertalink_bnlx\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/sertalink.com\/nl\/#logo\",\"inLanguage\":\"nl-BE\",\"url\":\"https:\/\/sertalink.com\/wp-content\/uploads\/2016\/09\/sertaLinkLogo.png\",\"width\":90,\"height\":112,\"caption\":\"Sertalink Belgium\"},\"image\":{\"@id\":\"https:\/\/sertalink.com\/nl\/#logo\"},\"location\":{\"@id\":\"https:\/\/sertalink.com\/symantec-endpoint-detection-and-response-2\/#local-place\"},\"address\":{\"@id\":\"https:\/\/sertalink.com\/symantec-endpoint-detection-and-response-2\/#local-place-address\"},\"email\":\"sales@sertalink.com\",\"telephone\":\"+3293109351\",\"areaServed\":\"Benelux\",\"vatID\":\"BE 0632.806.125\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sertalink.com\/nl\/#website\",\"url\":\"https:\/\/sertalink.com\/nl\/\",\"name\":\"Sertalink Belgium &amp; Luxembourg\",\"description\":\"Your link to a safe environment\",\"publisher\":{\"@id\":\"https:\/\/sertalink.com\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/sertalink.com\/nl\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"nl-BE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sertalink.com\/symantec-endpoint-detection-and-response-2\/#webpage\",\"url\":\"https:\/\/sertalink.com\/symantec-endpoint-detection-and-response-2\/\",\"name\":\"Symantec Endpoint Detection and Response | Sertalink Belgium &amp; Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/sertalink.com\/nl\/#website\"},\"datePublished\":\"2021-05-25T08:01:45+00:00\",\"dateModified\":\"2021-05-25T08:01:46+00:00\",\"inLanguage\":\"nl-BE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sertalink.com\/symantec-endpoint-detection-and-response-2\/\"]}]},{\"@type\":\"Place\",\"@id\":\"https:\/\/sertalink.com\/symantec-endpoint-detection-and-response-2\/#local-place\",\"address\":{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/sertalink.com\/symantec-endpoint-detection-and-response-2\/#local-place-address\",\"streetAddress\":\"Gentse Steenweg 47\",\"addressLocality\":\"Lokeren\",\"postalCode\":\"9160\",\"addressRegion\":\"Oost-Vlaanderen\",\"addressCountry\":\"BE\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"\",\"longitude\":\"\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"17:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"telephone\":\"+3293109351\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Lokeren\" \/>\n<meta name=\"geo.region\" content=\"Belgium\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages\/10423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/comments?post=10423"}],"version-history":[{"count":2,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages\/10423\/revisions"}],"predecessor-version":[{"id":10426,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages\/10423\/revisions\/10426"}],"wp:attachment":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/media?parent=10423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}