Part 2: Elevating Enterprise Security with Fidelis Endpoint
Endpoint provides a wide range of impressive features that add to the strength of the Elevate platform. SANS Analyst Matt Bromiley reviews a variety of features designed to enable holistic visibility and make analysts’ lives easier.
Watch this webinar to learn about features such as:
- Behavioral monitoring: Captures endpoint activities from end to end, simplifying triage and investigation activity
- Post-analysis analyst activities: Quick links to indicator tracking or enterprise scanning
- Built-in threat hunting capabilities: Real-time and historical data searches and tasking
- Threat intelligence and scanning: Capabilities to integrate third-party data into your organization
- Inventory: Complete inventory of software with automatic correlation and alerts based on known CVEs
If you missed it, be sure to watch the first part of this review: Elevating Enterprise Security with Fidelis Network and Deception.
Gerald Mancini has led the development of Fidelis Elevate since 2005, through its beginnings as a venture-backed start-up company. Under his leadership, the Fidelis product line evolved from a content-based network security tool to the Elevate platform designed to detect and respond to any activity along the cyber kill chain. Prior to joining the company, Mancini served as Director of Engineering at Torrent Network Technologies, where he led the development of an edge-router product which included software, hardware and custom chip design efforts. His tenure at Torrent continued after the company was acquired by Ericsson and the development effort shifted toward IP routing products for wireless infrastructure networks. Prior to joining Torrent, Mancini led chip development and system test for Nexion, an ATM switch manufacturer, both before and after its acquisition by Fujitsu.
Matt Bromiley is a SANS Digital Forensics and Incident Response instructor, teaching FOR508 Advanced Incident Response, Threat Hunting and Digital Forensics and SANS FOR572 Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response, and a GIAC Advisory Board member. He is also an incident response consultant at a major incident response and forensic analysis company, combining experience in digital forensics, incident response/triage and log analytics. His skills include disk, database, memory and network forensics, as well as network security monitoring. Matt has worked with clients of all types and sizes, from multinational conglomerates to small, regional shops. He is passionate about learning, teaching and working on open source tools.