About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
What is Endpoint Detection and Response (EDR)?
Related Media
Cybersecurity tools like Endpoint Detection and Response are becoming increasingly important for businesses looking to bolster their defenses against hackers. IBM’s Sam Hector provides an overview of how EDR tools work, including their four main functions: collecting security data, detecting & responding to threats, proactively hunting for threats, and integrating with existing tools to produce reports.
- Tags
- Appears In
Loading