Elastic: Getting started with endpoint protection: An architectural view
Now that Elastic Security’s endpoint protection is generally available to security teams everywhere, what does it take for an organisation to get started? What does a sample architecture look like from a small and larger deployment? And how do we take action when an endpoint starts misbehaving?
In this webinar, we will cover a basic overview of everything you need to protect your organization from malware, ransomware, trojans, cryptominers, rootkits, and exploits through the Endpoint Security integration. We’ll take a look at what running the integration across a multitude of environments looks like from a deployment and architectural perspective, and showcase how we can make security analysts’ lives easier when preventing and taking action against malicious activity.
Highlights:- Elastic Endpoint Security
- Deployment architecture
- Demo: Deploying the Endpoint Security integration and host isolation