[Myth Busting Series Part 1]
3 Challenges of Threat Hunting Using Endpoint Detection Tools
The Facts vs Myths of Threat Hunting
In part 2 of our myth busting webinar series, threat hunters from Infocyte will discuss how to scalably and proactively hunt for unknown threats across the entire enterprise network with an approach called Forensic State Analysis (FSA). We will compare FSA against three of the traditional methods of threat hunting that you may have been told are the “only” ways to perform threat hunting.
3 Challenges of Using EDR for Threat Hunting
In the recorded webinar threat hunter Chris Gerritz looks at the pitfalls of relying on Endpoint Detection (EDR) software as a substitute for proactive threat hunting, and examine some of the common misconceptions. He will also show how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, big data or experts.
In EDR vs FSA, you will learn about:
- The use cases for traditional Endpoint Detection
- The challenges of using real-time detection tools to find hidden threats
- How to hunt at scale and simplify the threat hunting process using FSA