{"id":193,"date":"2020-09-18T09:20:35","date_gmt":"2020-09-18T09:20:35","guid":{"rendered":"http:\/\/cybernetics.partners\/?p=193"},"modified":"2020-10-12T10:57:20","modified_gmt":"2020-10-12T10:57:20","slug":"challenging-ndr-systems-featuring-a-special-guest","status":"publish","type":"post","link":"https:\/\/cybernetics.partners\/?p=193","title":{"rendered":"Challenging NDR Technology, with Ammar Enaya"},"content":{"rendered":"\n<figure class=\"wp-block-embed-vimeo aligncenter wp-block-embed is-type-video is-provider-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Challenging NDR Technology - Featuring a Special Guest\" src=\"https:\/\/player.vimeo.com\/video\/462326462?dnt=1&amp;app_id=122963\" width=\"640\" height=\"360\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture; clipboard-write\"><\/iframe>\n<\/div><figcaption><em>Share your reactions and comments at the <a href=\"https:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:6716204358427541504\" target=\"_blank\" rel=\"noreferrer noopener\">Linkedin Cybernetics Partners page post<\/a><\/em><\/figcaption><\/figure>\n\n\n\n<p>Behavioral NDRs are a major evolution and depart from signature-based Intrusion Detection and Prevention systems and I believe NDRs will continue to evolve in terms of use cases, SOC integration, and deployment forms. This is because:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Network metadata will continue to be an indispensable source for security analysts.<\/li><li>Attackers will continue to morph attacks, enforcing more the need for behavioral detection.<\/li><li>Cloud technologies will continue to furnish the scalable platform that behavioral analytics thrives on.<\/li><\/ol>\n\n\n\n<p>Do you see NDR technology as integral part of your defense layers? Do you foresee that it will continue to evolve and cope well with polymorphic attacks? Or do you think otherwise?<\/p>\n\n\n\n<ul class=\"wp-block-social-links alignright is-layout-flex wp-block-social-links-is-layout-flex\">\n\n\n\n\n\n<li class=\"wp-social-link wp-social-link-linkedin  wp-block-social-link\"><a href=\"https:\/\/www.linkedin.com\/company\/cybernetics-partners\/\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li>\n\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Behavioral NDRs are a major evolution and depart from signature-based Intrusion Detection and Prevention systems and I believe NDRs will continue to evolve in terms of use cases, SOC integration, and deployment forms. This is because: Network metadata will continue to be an indispensable source for security analysts. Attackers will continue to morph attacks, enforcing [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":240,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[25,21,23,26],"class_list":["post-193","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-video","tag-artificial-intelligence","tag-machine-learning","tag-ndr","tag-network-detection-and-response"],"_links":{"self":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts\/193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=193"}],"version-history":[{"count":20,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts\/193\/revisions"}],"predecessor-version":[{"id":239,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts\/193\/revisions\/239"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/media\/240"}],"wp:attachment":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}