The website uses cookies to deliver services in accordance with the Cookies Policy. You can define the conditions for storing or accessing the cookie mechanism in your browser.
Mechanisms of protecting the edge of the network and end devices are visible to the attacker. A quick scan of a compromised laptop can reveal any activity taking place on it. If an attacker knows security, he can plan attacks in advance and target vulnerabilities. In response to this challenge, NDR (network detection and response) comes with help. It is a software for detecting and responding to the network, documenting activity in the business network in terms of threats and quickly responding to threats.
In the first Tech Wednesday webinar on Progress Software we will explain the basic functionalities of the NDR system and indicate whether it is necessary to use it in the business network of companies.
Agenda:
We invite you to the first TechWednesday webinar in 2023, which will take place on February 8 at 11:00. In it we will talk about NDR functionalities in Progress Software.
Mechanisms of protecting the edge of the network and end devices are visible to the attacker. A quick scan of a compromised laptop can reveal any activity taking place on it. If an attacker knows security, he can plan attacks in advance and target vulnerabilities. In response to this challenge, NDR (network detection and response) comes with help. It is a software for detecting and responding to the network, documenting activity in the business network in terms of threats and quickly responding to threats.
In the first Tech Wednesday webinar on Progress Software we will explain the basic functionalities of the NDR system and indicate whether it is necessary to use it in the business network of companies.
Agenda:
VAT ID 6762466740
REGON 122894922
KRS 0000467615
ph. +48 12 340 90 30