Elastic Announces New Threat Prevention Capabilities for Windows, macOS and Linux, and Host Isolation for Cloud Native Linux Environments
Expanding Threat Prevention to Stop Threats at the Endpoint
- Protecting organizations with malicious behavior prevention on Windows, macOS and Linux hosts
- Accelerating response with host isolation for cloud native Linux environments in Kibana
- Safeguarding Windows hosts with new memory threat protection
Elastic (ESTC), the company behind Elasticsearch and the Elastic Stack, announced Expanded Limitless Extended Detection and Response (XDR) capabilities across the Elastic Security solution in its 7.15 release, including new layers of prevention for Windows, macOS and Linux, and host isolation for cloud-native Linux environments.
Recommended AI News: Former Head of LEGO Ventures Joins Fast-Growing Developer of Speech Recognition Technology for Kids
Malicious behavior protection, now generally available, stops advanced threats at the endpoint for Windows, macOS and Linux hosts. Powered by analytics that prevent attack techniques leveraged by known threat actors, malicious behavior protection strengthens existing malware and ransomware preventions by pairing post-execution analytics with response actions to stop attacks before they cause damage.
Providing organizations another layer of prevention against cyber attacks, Elastic Security now provides memory threat protection for Windows endpoints, preventing memory manipulation via shellcode. Memory threat protection prevents attacks engineered to evade less sophisticated security technologies.
Leveraging cloud-native extended Berkeley Packet Filter (eBPF) technology, Elastic also introduces host isolation for cloud-native Linux environments, enabling security analysts to quarantine Linux hosts directly from Kibana by isolating the host from the network, containing the attack, and preventing lateral movement.
Recommended AI News: Newsflare’s Video delivers Ole Interactive 5x Revenue Growth
[To share your insights with us, please write to sghosh@martechseries.com ]
Comments are closed.