<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is EDR the new AV? in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/36428#M2780</link>
    <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; An interesting experience:&amp;nbsp;&amp;nbsp; Remember Symantec has lost its integrity due to the fact it was purchased and then subsequently sold again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://investors.broadcom.com/news-releases/news-release-details/broadcom-completes-acquisition-symantec-enterprise-security" target="_blank"&gt;https://investors.broadcom.com/news-releases/news-release-details/broadcom-completes-acquisition-symantec-enterprise-security&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then flipped it to Accenture:&amp;nbsp; &lt;A href="https://www.scmagazine.com/home/security-news/company-news/broadcom-flips-symantec-to-accenture-security/" target="_blank"&gt;https://www.scmagazine.com/home/security-news/company-news/broadcom-flips-symantec-to-accenture-security/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;EDR or even MDR is the new AV these days, watching user behaviour and other characteristics from the cloud.&lt;/P&gt;&lt;P&gt;They do this by using all the many customers intelligence building up Use Cases and collaborating with many others to provide a universal picture of what is going on in the real world.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Especially during the world situation at the moment, this is vitally important.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Others may use Crowdstrike.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you need another on the hosts, servers - I believe so - something like TrendMicro Enterprise Security - provides a good package of controls, but ensure performance configuration is worked at.&amp;nbsp;&amp;nbsp; Plus also remember the other factor now :&amp;nbsp; Containers and images - look up Red Hat 10 layers of security for Containers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The prime issue with Containers are that they are immutable, you have to create a new image for a change.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, if the attacker gains access to a Container, then all of them must re-created - they are most probably all compromised.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is also another element, if you have lots of containers, micro-segmentation and segregation and application gateways, as to who have authorised access, and what applications can legitimately communicate with.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 14 Jun 2020 06:30:58 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2020-06-14T06:30:58Z</dc:date>
    <item>
      <title>Is EDR the new AV?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/33255#M2398</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wanted to reach out to get your opinion on the above mentioned question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are looking for an alternative for our current endpoint protection product which is of course more than AV alone but has multiple additional modules which mostly seem to have been added by acquiring other vendors and their products. I had a short presentation by one of the interesting vendors for replacing our current solution recently who seem to have developed their solution from scratch. They are officially an EDR vendor (also listed in the appropriate Gartner quadrant chart) while our current solution is in the endpoint protection Gartner quadrant. However the EDR vendor told me that other customers have replaced their AV solution with their product. Do you think there is really a (sharp) distinction between EDR, AV and EPP at all? To me it seems it is like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AV: A deprecated and old expression for securing endpoints, servers etc.&lt;/P&gt;&lt;P&gt;EDR: The modern expression for AV with extended functionality&lt;/P&gt;&lt;P&gt;EPP: Formerly known as AV, now EDR.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Using these statements one has to answer the initial question with "Yes". What do you guys think?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PS. Sorry for my bad english as I'm a german native speaker.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2020 15:16:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/33255#M2398</guid>
      <dc:creator>the_admin</dc:creator>
      <dc:date>2020-03-02T15:16:02Z</dc:date>
    </item>
    <item>
      <title>Re: Is EDR the new AV?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/33258#M2399</link>
      <description>&lt;P&gt;I think you are getting caught up in the name game! Forget what they are calling things and look just at what they can and can not do. Look at what functions they offer and what you feel you need to protect against. Names change so fast lately it makes my head spin. So if you drop or hide all the names and look just at functionality and things like that what do things look like?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Every vendor will claim their product is the best and can do it all, until you want to see it done!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;John-&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2020 15:29:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/33258#M2399</guid>
      <dc:creator>JKWiniger</dc:creator>
      <dc:date>2020-03-02T15:29:43Z</dc:date>
    </item>
    <item>
      <title>Re: Is EDR the new AV?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/33259#M2400</link>
      <description>&lt;P&gt;Thanks, John. That definitely makes sense.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2020 15:34:17 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/33259#M2400</guid>
      <dc:creator>the_admin</dc:creator>
      <dc:date>2020-03-02T15:34:17Z</dc:date>
    </item>
    <item>
      <title>Re: Is EDR the new AV?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/33261#M2401</link>
      <description>&lt;P&gt;When in doubt a "cook off" to compare finalist against one another usually provides the best answer for your organization. Generally with any A/V, EPP or EDP solution, developers are generally shown to be the most difficult internal group to please. Start there, see if they find the solution acceptable and make your final decision with regard to the effectiveness of the control.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for naming conventions? Most of us have seen plenty of product name changes, particularly with regard to marketing. Take new names with a grain of salt but evaluate based on what is most effective for your organization.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- b/eads&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2020 16:34:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/33261#M2401</guid>
      <dc:creator>Beads</dc:creator>
      <dc:date>2020-03-02T16:34:18Z</dc:date>
    </item>
    <item>
      <title>Re: Is EDR the new AV?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/33279#M2404</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/896027927"&gt;@the_admin&lt;/a&gt;&amp;nbsp;&amp;nbsp; A very interesting topic, depending on which vendor you go to:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example famously Microsoft will tell you - you can have defender "free", which is AV, but if you want NGAV - New Generation AV - you have to purchase ATP, which depending on which type of organisation either comes with a steep discount for Government or a higher price for the Private Sector.&amp;nbsp;&amp;nbsp; You get what you pay for etc.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AV alone is insufficient, you need the wider collaborative intelligence to ensure any chance of protecting the organisation, looking at weaponisation, priorities and focus of the perpetrators.&amp;nbsp; New AV is just another term for New Generation AV - a market terms, as our colleagues point out - more hype than hype.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you follow the NIST cyber security framework, and the trends currently hitting organisations, EDR, EPP are no longer appropriate.&amp;nbsp; Many times the organisation has been compromised months previously without being aware it has occurred.&amp;nbsp;&amp;nbsp; So there is a swing towards MDR - Managed Detect &amp;amp; Response, which means Incident response, Forensic Investigation, Triage processes being invoked.&amp;nbsp; Many MDR services are now cloud based i.e. Crowdstrike, Carbon Black are good examples.&amp;nbsp;&amp;nbsp; Given that it can take up 260 plus days before an organisation actually realises they have been compromise, and the costs of an Incident reaching 8 or more times over time.&amp;nbsp;&amp;nbsp; End Point is a misnomer as well.&amp;nbsp; Given that these days it means Mobile, BYOD, Laptops, Workstations, Virtual Machines, Servers and practically anything linked with a user or privileged user.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So definitely see the swing towards Response, to potentially reduce the impact of the inevitable.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2020 20:55:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/33279#M2404</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-03-02T20:55:42Z</dc:date>
    </item>
    <item>
      <title>Re: Is EDR the new AV?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/33333#M2419</link>
      <description>Answer: yes. EDR is, quite literally, the new AV.&lt;BR /&gt;&lt;BR /&gt;Please, people, don't get caught up in whatever new marketing terms the sales&lt;BR /&gt;department comes up with to try and convince you that their "new thing" isn't&lt;BR /&gt;really just the same old, stuff, repackaged.&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;QA Engineer walks into a bar. Orders a beer. Orders 0 beers.&lt;BR /&gt;Orders 999999999 beers. Orders a lizard. Orders -1 beers. Orders&lt;BR /&gt;a sfdeljknesv. - &lt;A href="https://twitter.com/sempf/status/514473420277694465" target="_blank"&gt;https://twitter.com/sempf/status/514473420277694465&lt;/A&gt;&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt;</description>
      <pubDate>Tue, 03 Mar 2020 19:41:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/33333#M2419</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2020-03-03T19:41:53Z</dc:date>
    </item>
    <item>
      <title>Re: Is EDR the new AV?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/36397#M2768</link>
      <description>&lt;P&gt;I came here to ask about EDR, &lt;EM&gt;et voilà!&lt;/EM&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt; The thread is already waiting for me.&amp;nbsp; Thanks, everyone!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Back to Caute's response, we just added Carbon Black as an endpoint defense, and I was curious to know if anyone in the room feels like leaving SEP and Carbon Black Defense on the same computer is overkill.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edited to add: we had an incident in February, and Symantec made us aware on several computers that a threat was found... but that was all it noticed.&amp;nbsp; Meanwhile, a second ongoing other threat which SEP never observed, caused some PC data loss on the same machines.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We now have little faith in SEP, added CB Defense, and are doubling down on the backup plan which saved our bacon.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jun 2020 19:53:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/36397#M2768</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2020-06-12T19:53:53Z</dc:date>
    </item>
    <item>
      <title>Re: Is EDR the new AV?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/36428#M2780</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; An interesting experience:&amp;nbsp;&amp;nbsp; Remember Symantec has lost its integrity due to the fact it was purchased and then subsequently sold again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://investors.broadcom.com/news-releases/news-release-details/broadcom-completes-acquisition-symantec-enterprise-security" target="_blank"&gt;https://investors.broadcom.com/news-releases/news-release-details/broadcom-completes-acquisition-symantec-enterprise-security&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then flipped it to Accenture:&amp;nbsp; &lt;A href="https://www.scmagazine.com/home/security-news/company-news/broadcom-flips-symantec-to-accenture-security/" target="_blank"&gt;https://www.scmagazine.com/home/security-news/company-news/broadcom-flips-symantec-to-accenture-security/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;EDR or even MDR is the new AV these days, watching user behaviour and other characteristics from the cloud.&lt;/P&gt;&lt;P&gt;They do this by using all the many customers intelligence building up Use Cases and collaborating with many others to provide a universal picture of what is going on in the real world.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Especially during the world situation at the moment, this is vitally important.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Others may use Crowdstrike.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you need another on the hosts, servers - I believe so - something like TrendMicro Enterprise Security - provides a good package of controls, but ensure performance configuration is worked at.&amp;nbsp;&amp;nbsp; Plus also remember the other factor now :&amp;nbsp; Containers and images - look up Red Hat 10 layers of security for Containers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The prime issue with Containers are that they are immutable, you have to create a new image for a change.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, if the attacker gains access to a Container, then all of them must re-created - they are most probably all compromised.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is also another element, if you have lots of containers, micro-segmentation and segregation and application gateways, as to who have authorised access, and what applications can legitimately communicate with.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jun 2020 06:30:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/36428#M2780</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-06-14T06:30:58Z</dc:date>
    </item>
    <item>
      <title>Re: Is EDR the new AV?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/36431#M2783</link>
      <description>&lt;P&gt;I don't fully understand the concept of containers yet.&amp;nbsp; We're not currently using them in our enterprise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you suggesting that doubling up AV / EDR defense on our servers may be a good idea, as opposed to just letting the user PCs leverage only the CB services?&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jun 2020 13:13:15 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/36431#M2783</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2020-06-14T13:13:15Z</dc:date>
    </item>
    <item>
      <title>Re: Is EDR the new AV?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/36432#M2784</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;with containers one just runs one program and you choose what network addresses and ports the container can access, as well as storage. With static storage being held outside of the container it allow the container to be deleted and redeployed with no impact. This makes it so that if a program in a container gets compromised it is simply deleted and a new contained is deployed. There is actually a software called Falco which will monitor the security of the containers and if a change is detected from the deployed image it will automatically delete it and deploy a fresh one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hopefully that made some sense... I need coffee!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;John-&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jun 2020 13:25:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/36432#M2784</guid>
      <dc:creator>JKWiniger</dc:creator>
      <dc:date>2020-06-14T13:25:30Z</dc:date>
    </item>
    <item>
      <title>Re: Is EDR the new AV?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/36433#M2785</link>
      <description>&lt;P&gt;So a container is created just for one program or process?&amp;nbsp; Does a container run/operate within a VM, or in the guest RAM / processor cycles?&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jun 2020 13:35:17 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/36433#M2785</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2020-06-14T13:35:17Z</dc:date>
    </item>
    <item>
      <title>Re: Is EDR the new AV?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/36435#M2786</link>
      <description>&lt;P&gt;Think of it as a VM runs an operating system. A computer can run multiple VMs, but a VM can run only one operation system. Now scale it to the application level and you have that one VM can run multiple containers. I have only run one program per container, but it is probably possible to run a few in one, but I don't think this is advisable. It would depend on how you build the image. Containers run purely in memory, which makes sense since they are processes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Imagine a web server. In the world of VMs if you need more capacity to handle requests you would need to deploy and spin up more VMs, which can take a little time. Since the container is just the process it is light weight and can be brought up and down very quickly compared to the VM, and in reality you only need the more processes to handle your requests and not the full operating system that you get from a VM.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are so many things in an operating system that need to be updated and secured, while in the container you have one process, which is restricted to what it can access when it is deployed. It's just simplifies things.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have not tried it but I did see that VMware Fusion on the Mac now supports containers so it could be something interesting to look at. Or you can always just install docker and manage things with portioner.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;John-&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jun 2020 14:47:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/36435#M2786</guid>
      <dc:creator>JKWiniger</dc:creator>
      <dc:date>2020-06-14T14:47:27Z</dc:date>
    </item>
    <item>
      <title>Re: Is EDR the new AV?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/36440#M2787</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I like to think of it in layers:&amp;nbsp; Networks, Servers, Operating Systems in traditional systems&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then moving to virtual systems on VMware or others - have their own Operating Systems and applications sitting on top, with their own resources.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On VMware you are dependent on the underlying VMware environment, ESX gateways, but they are always accessible to the VMWare Administrator.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Containers, as our colleague states is the next realm, they do simplify everything, they don't use as much resources, and you can literally containerise your applications into specific areas or within Cloud environments distribute them, so you can keep control of them.&amp;nbsp;&amp;nbsp;&amp;nbsp; You can control who has access to them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Often Containers are used for DevOps environments, where lots of software development is being used and using Agile development techniques, but remember the SecDevOps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is a quick explanation with graphical depiction:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://blog.netapp.com/blogs/containers-vs-vms/" target="_blank" rel="noopener"&gt;https://blog.netapp.com/blogs/containers-vs-vms/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Containers and Microservices explanation:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://searchitoperations.techtarget.com/definition/container-containerization-or-container-based-virtualization?_ga=2.96474268.263681440.1592169169-979963156.1591513038" target="_blank" rel="noopener"&gt;https://searchitoperations.techtarget.com/definition/container-containerization-or-container-based-virtualization?_ga=2.96474268.263681440.1592169169-979963156.1591513038&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many Cloud services offer free or even Opensource vulnerability tools such as JFrog and many others, so as you create an new container, they are automatically scanned for vulnerabilities and rates in terms of impact of the discovered vulnerabilities at that point in time.&amp;nbsp;&amp;nbsp; It is part of the microservices, reducing environments into the smallest necessary to run them, isolating them and literally containing them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A lot of cloud architects, tend to think this makes their lives easier, but they have to think through the entire SDLC lifecycle including DevOps, and now SecDevOps as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Servers, as my colleague states - have many aspects go along to Cloud Internet Security (CIS) to review their benchmarks on hardening for Operating Systems, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Often McAfee, Symantec, TrendMicro, Sophos offer services above an beyond normal AV these days for hosts, servers and operating Systems - things such as host based Firewalls, Host based IDS/IPS, File Integrity, Web Reputation, Log monitoring etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Carbon Black or Crowdstrike use a different approach monitoring end points i.e. servers or desktops, laptops etc, looking for user behaviour or actions which may constitute a compromise or attempt to compromise files, hosts, servers etc.&amp;nbsp;&amp;nbsp; It is far more holistic.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, you still have traditional needs, these have not gone away even in cloud environments.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My personal take is VMware does a great job, but I like some independence rather than depending on a single vendor, especially in shared or multi-cloud environments.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I like some of the Container solutions like Twistlock and Illumio&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.twistlock.com/&amp;nbsp;" target="_blank" rel="noopener"&gt;https://www.twistlock.com/&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Only caveat I have, economic as long as you have 100's of containers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.illumio.com/lp/illumio-asp-micro-segmentation-overview?gclid=CjwKCAjwlZf3BRABEiwA8Q0qq9MlANpp3vPs_vrfFQcBuNkUxDMSztSytOT3d3YSZ3M0KmKI7-lwrRoCdGEQAvD_BwE" target="_blank" rel="noopener"&gt;https://www.illumio.com/lp/illumio-asp-micro-segmentation-overview?gclid=CjwKCAjwlZf3BRABEiwA8Q0qq9MlANpp3vPs_vrfFQcBuNkUxDMSztSytOT3d3YSZ3M0KmKI7-lwrRoCdGEQAvD_BwE&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are others such as Aqua&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.aquasec.com/" target="_blank" rel="noopener"&gt;https://www.aquasec.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jun 2020 21:21:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/36440#M2787</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-06-14T21:21:44Z</dc:date>
    </item>
    <item>
      <title>Re: Is EDR the new AV?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/36459#M2791</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;, with regards to containers, you're essentially packaging the application processes --- with some isolation --- &amp;amp; this increasing the efficiency / manageability, &amp;amp; perhaps also enhancing security to some extent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That being said, the use of containers can't take the place of an EPP / EDR solution. As&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;had mentioned, they can be compromised. We used Docker in our organisation. &lt;A href="https://www.stackrox.com/post/2019/09/docker-security-101/#:~:text=Images%20can%20also%20contain%20vulnerabilities,an%20ever%2Dchanging%20container%20environment." target="_blank" rel="noopener"&gt;This link&lt;/A&gt; gives you some info on the security concerns with that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At the end of the day, you should have a good EPP / EDR solution to safeguard the infrastructure, &amp;amp; it shoud not consume to much resources either.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Providers tend to change the names of their solutions even if there's little change in the features, so it's best to check on the features &amp;amp; test the solution with a PoC to ensure you're satisfied with it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An example: we use a Virtual Desktop Infrastructure (VDI) for which the EPP provider was asked to facilitate an agent-less mode to ensure minimal performance impact --- but went on to try to convince us to use their agent-based mode for added features. Our engineer tested an instance and found that it consumed way too many resources, after which the provider relented.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 09:04:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Is-EDR-the-new-AV/m-p/36459#M2791</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2020-06-15T09:04:25Z</dc:date>
    </item>
  </channel>
</rss>

