Elastic: Getting started with endpoint protection: An architectural view

Elastic: Getting started with endpoint protection: An architectural view

 CEST
Online

Now that Elastic Security’s endpoint protection is generally available to security teams everywhere, what does it take for an organisation to get started? What does a sample architecture look like from a small and larger deployment? And how do we take action when an endpoint starts misbehaving?

In this webinar, we will cover a basic overview of everything you need to protect your organization from malware, ransomware, trojans, cryptominers, rootkits, and exploits through the Endpoint Security integration. We’ll take a look at what running the integration across a multitude of environments looks like from a deployment and architectural perspective, and showcase how we can make security analysts’ lives easier when preventing and taking action against malicious activity.

Highlights:

  • Elastic Endpoint Security
  • Deployment architecture
  • Demo: Deploying the Endpoint Security integration and host isolation