Arno Van de Velde
Senior Solutions Architect
Now that Elastic Security’s endpoint protection is generally available to security teams everywhere, what does it take for an organisation to get started? What does a sample architecture look like from a small and larger deployment? And how do we take action when an endpoint starts misbehaving?
In this webinar, we will cover a basic overview of everything you need to protect your organization from malware, ransomware, trojans, cryptominers, rootkits, and exploits through the Endpoint Security integration. We’ll take a look at what running the integration across a multitude of environments looks like from a deployment and architectural perspective, and showcase how we can make security analysts’ lives easier when preventing and taking action against malicious activity.
Elastic Endpoint Security
Demo: Deploying the Endpoint Security integration and host isolation
You can try hosted Kibana (and Elasticsearch) with a no-cost Elastic Cloud 14-day trial.
Register to attend
Can’t make it? Register and we’ll send you the recording. You’ll also receive an email with related content.
Share with your friends: