{"id":3990,"date":"2021-06-15T09:47:21","date_gmt":"2021-06-15T09:47:21","guid":{"rendered":"https:\/\/www.neam.de\/?p=19885"},"modified":"2021-06-15T09:47:21","modified_gmt":"2021-06-15T09:47:21","slug":"webcast-angreifer-rechtzeitig-erkennen-mit-edr-und-xdr","status":"publish","type":"post","link":"https:\/\/www.kai-wittenburg.de\/?p=3990","title":{"rendered":"Webcast: Angreifer rechtzeitig erkennen \u2013  mit EDR und XDR"},"content":{"rendered":"<div id=\"pl-19885\"  class=\"panel-layout\" >\n<div id=\"pg-19885-0\"  class=\"panel-grid panel-no-style\" >\n<div id=\"pgc-19885-0-0\"  class=\"panel-grid-cell\" >\n<div id=\"panel-19885-0-0-0\" class=\"so-panel widget widget_sow-image panel-first-child panel-last-child\" data-index=\"0\" >\n<div class=\"so-widget-sow-image so-widget-sow-image-default-d6014b76747a\">\n<div class=\"sow-image-container\">\n<a href=\"https:\/\/register.gotowebinar.com\/register\/5011635987335268621?source=98304-18827\"  rel=\"noopener noreferrer\" >\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.neam.de\/wp-content\/uploads\/neam_banner_webcast_sophos_edr_xdr_1920x500.jpg\" width=\"1920\" height=\"500\" srcset=\"https:\/\/www.neam.de\/wp-content\/uploads\/neam_banner_webcast_sophos_edr_xdr_1920x500.jpg 1920w, https:\/\/www.neam.de\/wp-content\/uploads\/neam_banner_webcast_sophos_edr_xdr_1920x500-300x78.jpg 300w, https:\/\/www.neam.de\/wp-content\/uploads\/neam_banner_webcast_sophos_edr_xdr_1920x500-1024x267.jpg 1024w, https:\/\/www.neam.de\/wp-content\/uploads\/neam_banner_webcast_sophos_edr_xdr_1920x500-768x200.jpg 768w, https:\/\/www.neam.de\/wp-content\/uploads\/neam_banner_webcast_sophos_edr_xdr_1920x500-1536x400.jpg 1536w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" alt=\"Banner zum Webcast Angreifer rechtzeitig erkennen mit EDR und XDR\" \t\tclass=\"so-widget-image\"\/><br \/>\n<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"pg-19885-1\"  class=\"panel-grid panel-no-style\" >\n<div id=\"pgc-19885-1-0\"  class=\"panel-grid-cell\" >\n<div id=\"panel-19885-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" >\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<h4><a href=\"https:\/\/register.gotowebinar.com\/register\/5011635987335268621?source=98304-18827\"  rel=\"noopener\">WEBCAST AM 22.06.2021: JETZT ANMELDEN!<\/a>*<\/h4>\n<p>Angreifer schaffen es mittlerweile, sich \u00fcber lange Zeit perfekt zu tarnen, bevor sie zuschlagen und ihren eigentlichen Angriff starten. Je schneller Sie die Angreifer erkennen, desto schneller k\u00f6nnen Sie Ma\u00dfnahmen ergreifen und Schlimmeres verhindern.<\/p>\n<p>Erfahren Sie im Webcast unseres Partners Sophos, wie Sie mit Technologien wie Endpoint Detection and Response (EDR) und Extended Detection and Response (XDR) eine schnelle Erkennung und effektive Bek\u00e4mpfung der Angreifer realisieren k\u00f6nnen:<\/p>\n<p>\u2022 Threat Hunting: Sp\u00fcren Sie evasive Bedrohungen auf und beseitigen Sie diese schnell.<a href=\"https:\/\/www.neam.de\/wp-content\/uploads\/sophos-platinum-partner-299x118-1.png\" rel=\"shadowbox[sbpost-19885];player=img;\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-16951 alignright\" src=\"https:\/\/www.neam.de\/wp-content\/uploads\/sophos-platinum-partner-299x118-1.png\" alt=\"Logo Sophos Platinum Partner\" width=\"299\" height=\"118\" \/><\/a><\/p>\n<p>\u2022 IT Operations: Sorgen Sie f\u00fcr eine erstklassige Einhaltung von Sicherheitsvorgaben.<\/p>\n<p>\u2022 Data Lake Technologie: Nutzen Sie XDR, um auch offline Daten zur Bedrohungsanalyse zu erhalten.<\/p>\n<p>\u2022 XDR: Profitieren Sie von produkt\u00fcbergreifenden Abfragen, um ein ganzheitliches Bild zu bekommen.<\/p>\n<p>Dar\u00fcber hinaus haben Sie Gelegenheit, live im Chat den Experten Ihre Fragen zu stellen.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/register.gotowebinar.com\/register\/5011635987335268621?source=98304-18827\"  rel=\"noopener\" data-tags=\"Sophos,Live_Hacking,IT_Security\"><strong>Sichern Sie sich jetzt Ihren Platz!<\/strong><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"pg-19885-2\"  class=\"panel-grid panel-no-style\" >\n<div id=\"pgc-19885-2-0\"  class=\"panel-grid-cell\" >\n<div id=\"panel-19885-2-0-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"2\" >\n<div class=\"so-widget-sow-button so-widget-sow-button-atom-5c9de4d82cbc\">\n<div class=\"ow-button-base ow-button-align-center\">\n\t<a href=\"https:\/\/register.gotowebinar.com\/register\/5011635987335268621?source=98304-18827\" class=\"ow-icon-placement-left ow-button-hover\"  rel=\"noopener noreferrer\" \t\t><br \/>\n\t\t<span><\/p>\n<p>\t\t\tJetzt anmelden\t\t<\/span><br \/>\n\t<\/a>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"pg-19885-3\"  class=\"panel-grid panel-no-style\" >\n<div id=\"pgc-19885-3-0\"  class=\"panel-grid-cell\" >\n<div id=\"panel-19885-3-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" >\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<p><em>Hinweis: Sollten Sie aus zeitlichen Gr\u00fcnden nicht teilnehmen k\u00f6nnen, melden Sie sich bitte dennoch f\u00fcr die Webinare an, Sie erhalten im Nachhinein so automatisch den Link zur Aufzeichnung von uns per E-Mail. Die Webinare sind kostenfrei; es fallen ggf. Telefongeb\u00fchren f\u00fcr Sie an.<\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Erfahren Sie, wie Sie mit Technologien wie EDR und XDR eine schnelle Erkennung und effektive Bek&auml;mpfung der Angreifer realisieren k&ouml;nnen.<\/p>\n","protected":false},"author":41,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20,1659,5,378,6,3,7,76,18,1661,814,852,4,12,17,15,91,1331,9,16,14,1334,8],"tags":[],"class_list":["post-3990","post","type-post","status-publish","format-standard","hentry","category-blog","category-break-a-hackers-heart","category-bsi","category-cybersecurity","category-isms","category-isms-bsi-iso-27001","category-iso27001","category-it-sicherheit","category-it-systeme","category-live-hacking","category-mitarbeitersensibilisierung","category-netzwerk-virtualisierung","category-notfallmanagement","category-penetrationstest","category-penetrationstests","category-risikomanagement","category-security","category-sophos","category-storage-backup-restore","category-unternehmen","category-veranstaltungen","category-webinar","category-zertifizierung-audit"],"_links":{"self":[{"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=\/wp\/v2\/posts\/3990","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3990"}],"version-history":[{"count":5,"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=\/wp\/v2\/posts\/3990\/revisions"}],"predecessor-version":[{"id":4081,"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=\/wp\/v2\/posts\/3990\/revisions\/4081"}],"wp:attachment":[{"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3990"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3990"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}