Endpoint Detection and Response

Endpoint detection is intelligent security software that is installed on the end device (eg computer, smartphone, tablet) of the user, in conjunction with monitoring by IT security experts. The goal is to protect the devices from cyber attacks and react as quickly as possible in the event of an incident.

How exactly does endpoint detection work?

The service comes in two stages and is roughly comparable to security checks at events.

Stage 1: The rough scan

Intelligent antivirus protection scans all data that arrives on the device for known malicious programs from the stored database. Machine learning can also detect variations of dangerous programs. Suspicious actions are automatically blocked. Inconspicuous information is allowed through. As with security checks, anyone who looks harmless and is not a known troublemaker will come in.

Stage 2: The manual examination

The intelligent part of the service detects suspicious activity that is not clearly a cyber attack from the outset. These are immediately reported to IT security experts who manually check the irregularities. If it is an attack, they take initial action. In major incidents, those affected will be informed promptly to take joint action. Again, the comparison with the security check fits: Whoever behaves suspiciously is checked and not even let in, or kicked out if necessary.

The range of services offered in the individual components, artificial intelligence, software, monitoring and IT security experts, can vary greatly from provider to provider.

Related articles

  • Data Backup

    Is an alternative term for “backup” and refers to the process of creating backup copies of existing data. -> for more information, see the “Backup” keyword.

    mehr lesen
  • Credential Stuffing

    Credential stuffing is the automated use of exposed username/password combinations to gain access to user accounts and, if necessary, to take them over completely.

    mehr lesen

Are you curious?

Test us for 30 days free of charge and without obligation.

We empower your employees to actively contribute to your company’s cybersecurity.

See for yourself how easily and quickly Perseus can be integrated into your corporate structure.

Test now for free

Do you have any questions about our services?

Do not hesitate to call: + 49 30 95 999 8080

  • Free trial period
  • Without obligation
  • Video training for cyber security and data protection with exam and certificate
  • Try our phishing simulation
  • IT security check, malware scanner, data security check and more
  • Ends automatically after 30 days