Cybersecurity company Symantec has announced a new managed endpoint detection and response (MEDR) service and enhanced EDR 4.0 technology.
These advancements improve attack discovery and incident response using AI-driven analytics and automation to quickly discover and stop sophisticated cyber attacks.
Enterprise IT and Security Ops teams are increasingly challenged to investigate and respond to advanced and emerging threats with available resources and staff.
Symantec’s MEDR service harnesses the power of EDR 4.0 to improve incident response, threat hunting and forensics, giving teams investigation expertise and threat intelligence from a team of Symantec SOC analysts.
Symantec MEDR detects attacks and examines suspicious activity for faster incident validation and response.
A combination of Symantec EDR 4.0, the SOC technology platform, and the Global Intelligence Network, allows Symantec analysts to provide 24x7 expertise.
Managed threat hunting, remote investigations, and endpoint containment enable security teams around the world to stay ahead of threats.
“Many customers can’t find enough cybersecurity experts to meet demand. Our MEDR service provides access to Symantec’s SOC analysts and machine learning techniques to reduce the burden on staff and shrink the time it takes to investigate incidents,” says Symantec enterprise products EVP and GM Art Gilliland.
“For organisations with robust security response teams, EDR 4.0 is now available on any device, anywhere, before or after an attack occurs to provide comprehensive detection and response.”
Symantec’s EDR 4.0 continuously updates AI-driven detection engines using threat research from Symantec’s elite team of researchers and global telemetry from 175 million endpoints to train analytics to detect new attack patterns.
EDR 4.0 is now available on any device, anywhere, before or after an attack.
New features include:
“Many organisations are struggling with threat detection and incident response because of both the volume and sophistication of attacks and an expanding attack surface. They also face many challenges including the volume of alerts and a continued reliance on manual processes,” says Jon Oltsik ESG senior principal analyst.
“With a critical shortage of skilled investigators available, security teams need smart tools and services that can help them deal with the scale and speed of the modern threat environment, making it easier to identify and fix impacted endpoints.
“To improve IR processes, cybersecurity professionals must eschew legacy approaches and embrace the right tools and services,” Oltsik says.