{"id":506082,"date":"2024-02-29T16:53:03","date_gmt":"2024-02-29T15:53:03","guid":{"rendered":"https:\/\/www.stormshield.com\/endpoint-detection-response-edr\/"},"modified":"2024-09-16T13:27:50","modified_gmt":"2024-09-16T12:27:50","slug":"edr","status":"publish","type":"page","link":"https:\/\/www.stormshield.com\/de\/edr\/","title":{"rendered":"Endpoint Detection &#038; Response &#8211; EDR"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_top=\"50\" padding_bottom=\"50\" css=\".vc_custom_1708942368363{background-color: #ffffff !important;}\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner][vc_empty_space][vc_column_text]<\/p>\n<h1 style=\"text-align: center;\"><span style=\"color: #00aaf5;\"><span style=\"font-weight: 900; font-size: 1.5em;\">Endpoint Detection &amp; Response (EDR)<\/span><\/span><span style=\"color: #00aaf5;\"><span style=\"font-weight: 300; font-size: 1.5em;\"> zum Schutz Ihrer Terminals<\/span><\/span><\/h1>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_top=\"50\" padding_bottom=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"3\/4\" css=\".vc_custom_1708939697175{padding-right: 32px !important;padding-left: 32px !important;}\"][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: black; line-height: 0.8em;\">Was ist ein EDR?<\/span><\/h2>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\">Innerhalb Ihres Computersystems bietet jedes vernetzte Endger\u00e4t ein potenzielles Angriffspotential und jede Verbindung stellt einen Eingangspunkt zu Ihrem Informationssystem und Ihren sensiblen Daten dar. Anti-Viren-Technologien sind bei hochentwickelten Cyberangriffen begrenzt wirksam. Grenzen, die die EDR-L\u00f6sungen (<em>Endpoint Detection and Response<\/em>) erf\u00fcllen k\u00f6nnen.<\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\"><strong>Diese EDR-L\u00f6sungen erh\u00f6hen die Sicherheit von Terminals mit Hilfe von Echtzeit-\u00dcberwachung, intelligenter Angriffserkennung (Intrusion Detection) und rascher Abhilfe sowie kontinuierlicher Verbesserung des Schutzes.<\/strong><\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/4\"][vc_empty_space][vc_single_image image=\"266687\" img_size=\"full\" alignment=\"center\" qode_css_animation=\"\"][vc_empty_space height=\"12px\"][vc_single_image image=\"266673\" img_size=\"full\" alignment=\"center\" qode_css_animation=\"\"][vc_empty_space height=\"12px\"][vc_single_image image=\"266681\" img_size=\"full\" alignment=\"center\" qode_css_animation=\"\"][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" css=\".vc_custom_1726488875662{padding-top: 32px !important;padding-right: 32px !important;padding-bottom: 32px !important;padding-left: 32px !important;}\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"grid\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"1\/3\" css=\".vc_custom_1708939714814{padding-right: 32px !important;padding-left: 32px !important;}\"][vc_empty_space][vc_single_image image=\"267313\" img_size=\"medium\" qode_css_animation=\"\"][\/vc_column_inner][vc_column_inner width=\"2\/3\"][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: black; line-height: 0.8em;\">\u00dcberwachung der Terminals in Echtzeit<\/span><\/h2>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\"><strong>Die EDR-Technologie basiert auf der Erfassung von Daten, die \u00fcber Endger\u00e4te, Netzwerkverbindungen \u00fcber verschiedene Prozesse bis hin zu offenen Dateien, dem Laden von Treibern, der Nutzung von Speicher und Festplatte oder durch den Zugriff auf die zentrale Datenbank \u00fcbertragen werden.<\/strong> Danach werden alle diese Daten an eine EDR-Analysemethode \u00fcbermittelt, die verd\u00e4chtige und anormale Verhaltensweisen erkennt. Das Ergebnis ist eine Abbildung der gesamten Aktivit\u00e4ten der Terminals in Echtzeit, wodurch eine schnelle Erkennung b\u00f6sartiger Aktivit\u00e4ten m\u00f6glich ist.<\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" css=\".vc_custom_1726488875662{padding-top: 32px !important;padding-right: 32px !important;padding-bottom: 32px !important;padding-left: 32px !important;}\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"2\/3\"][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: black; line-height: 0.8em;\">Intelligente Erkennung und schnelle Behebung<\/span><\/h2>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\">EDR-Technologien nutzen die Verhaltensanalyse, um diese verd\u00e4chtigen und anormalen Verhaltensweisen zu erkennen. Die zentrale Datenanalysephase ist von entscheidender Bedeutung, da sie zur Erh\u00e4rtung von Informationen beitr\u00e4gt, aus denen Angriffsschemata, einschlie\u00dflich Zero-Day-Cyberattacken, abzuleiten sind. <strong>Im Falle der Erkennung einer Cyber-Bedrohung oder eines versuchten Angriffs empfiehlt die EDR Abhilfema\u00dfnahmen wie die Einstellung eines laufenden Prozesses, die Blockierung einer Ausf\u00fchrung, die Quarant\u00e4ne einer Datei oder die Isolierung infizierter Endger\u00e4te...<\/strong> Administratoren und Sicherheitsanalysten k\u00f6nnen dann anhand der Analyseergebnisse ermitteln und die am besten geeigneten Abhilfema\u00dfnahmen durchf\u00fchren.<\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/3\" css=\".vc_custom_1708939721806{padding-right: 32px !important;padding-left: 32px !important;}\"][vc_empty_space][vc_single_image image=\"267307\" img_size=\"medium\" qode_css_animation=\"\"][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" css=\".vc_custom_1726488875662{padding-top: 32px !important;padding-right: 32px !important;padding-bottom: 32px !important;padding-left: 32px !important;}\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"1\/3\" css=\".vc_custom_1708939727974{padding-right: 32px !important;padding-left: 32px !important;}\"][vc_empty_space][vc_single_image image=\"267298\" img_size=\"medium\" qode_css_animation=\"\"][\/vc_column_inner][vc_column_inner width=\"2\/3\"][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: black; line-height: 0.8em;\">Kontinuierliche Verbesserung des Schutzes<\/span><\/h2>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\">Angesichts einer st\u00e4ndigen Weiterentwicklung der Betriebsweise unterst\u00fctzt die EDR-L\u00f6sung das Verst\u00e4ndnis und das Lernen der Sicherheitsteams. <strong>Dank der in den Untersuchungsphasen gesammelten und analysierten Daten sind sie f\u00fcr die Bek\u00e4mpfung zuk\u00fcnftiger Cyber-Angriffe besser ger\u00fcstet.<\/strong> Die Incident Response erm\u00f6glicht es, fr\u00fchere Aktionen besser zu verstehen, z. B. durch die Darstellung der Kausalzusammenh\u00e4nge einer Angriffskette und die kontinuierliche Verbesserung des Schutzes durch die EDR-L\u00f6sung.<\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" css=\".vc_custom_1708939922324{padding-top: 32px !important;padding-right: 32px !important;padding-bottom: 32px !important;padding-left: 32px !important;background-color: #060051 !important;}\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: #ffffff; line-height: 0.8em;\">Stormshield Endpoint Security Evolution, Ihre zertifizierte EDR-L\u00f6sung<\/span><\/h2>\n<p><span style=\"color: #ffffff; font-size: 1.1em;\">Mit der Stormshield Endpoint Security Evolution (SES) erh\u00f6hen Sie das Schutzniveau Ihrer Arbeitspl\u00e4tze mit einer proaktiven EDR-L\u00f6sung. Basierend auf einer signaturlosen Analysetechnik erkennt die SES-L\u00f6sung Angriffe und Cyber-Bedrohungen und reagiert angemessen darauf. Unsere vertrauensw\u00fcrdige EDR-L\u00f6sung hat die Sicherheitszertifizierung der ersten Stufe (CSPN) erhalten, die von der ANSSI f\u00fcr die Kategorie Intrusion ausgestellt wurde.<\/span><\/p>\n<p><span style=\"color: #000; font-size: 1.1em;\"><span style=\"color: #ffffff;\"><strong>Entdecken Sie eine EDR-L\u00f6sung zum Schutz der Endger\u00e4te und Server der n\u00e4chsten Generation.<\/strong> Und mit seinen Funktionen Cyber Threat Intelligence und Threat Hunting verf\u00fcgen Sie \u00fcber eine fortgeschrittene Technologie, um selbst ausgekl\u00fcgelte Cyberangriffe zu erkennen.<\/span><\/span>[\/vc_column_text][vc_empty_space][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"1\/3\"]<div class=\"qode_video_box\">\n\t<a itemprop=\"image\" class=\"qode_video_image\" href=\"https:\/\/youtu.be\/7bZ3jmJz3T8\" data-rel=\"prettyPhoto\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1918\" height=\"1078\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/en1.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/en1.jpg 1918w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-300x169.jpg 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-1024x576.jpg 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-768x432.jpg 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-1536x863.jpg 1536w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-1396x785.jpg 1396w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-700x393.jpg 700w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-539x303.jpg 539w\" sizes=\"auto, (max-width: 1918px) 100vw, 1918px\" \/>\t\t\t<span class=\"qode_video_box_button_holder\">\n\t\t\t\t<span class=\"qode_video_box_button\">\n\t\t\t\t\t<span class=\"qode_video_box_button_arrow\">\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/span>\n\t\t\t<\/a>\n<\/div>[vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/3\"]<div class=\"qode_video_box\">\n\t<a itemprop=\"image\" class=\"qode_video_image\" href=\"https:\/\/youtu.be\/7vAeJpk0ErA\" data-rel=\"prettyPhoto\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1276\" height=\"710\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-37.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-37.jpg 1276w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-37-300x167.jpg 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-37-1024x570.jpg 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-37-768x427.jpg 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-37-700x389.jpg 700w\" sizes=\"auto, (max-width: 1276px) 100vw, 1276px\" \/>\t\t\t<span class=\"qode_video_box_button_holder\">\n\t\t\t\t<span class=\"qode_video_box_button\">\n\t\t\t\t\t<span class=\"qode_video_box_button_arrow\">\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/span>\n\t\t\t<\/a>\n<\/div>[vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/3\"]<div class=\"qode_video_box\">\n\t<a itemprop=\"image\" class=\"qode_video_image\" href=\"https:\/\/youtu.be\/T9KhySZFkWs\" data-rel=\"prettyPhoto\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1274\" height=\"712\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-55.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-55.jpg 1274w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-55-300x168.jpg 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-55-1024x572.jpg 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-55-768x429.jpg 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-55-700x391.jpg 700w\" sizes=\"auto, (max-width: 1274px) 100vw, 1274px\" \/>\t\t\t<span class=\"qode_video_box_button_holder\">\n\t\t\t\t<span class=\"qode_video_box_button\">\n\t\t\t\t\t<span class=\"qode_video_box_button_arrow\">\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/span>\n\t\t\t<\/a>\n<\/div>[vc_empty_space][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner]<a  itemprop=\"url\" href=\"https:\/\/www.stormshield.com\/de\/produkte-und-services\/produkte\/schutz-von-workstations-und-servern\/stormshield-endpoint-security\/\" target=\"_blank\" data-hover-background-color=\"#d23467\" data-hover-border-color=\"#d23467\" class=\"qbutton  center white enlarge\" style=\"border-color: #ffffff; background-color:#00aaf5;\">Stormshield Endpoint Security entdecken<i class=\"qode_icon_font_awesome fa fa-angle-right qode_button_icon_element\"><\/i><\/a>[vc_empty_space][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" css=\".vc_custom_1708702319908{background-color: #ffffff !important;}\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"1\/2\"][vc_empty_space]<span class=\"separator_with_icon\" style=\"color:#060051\"><i class=\"fa fa-question\"><\/i><\/span>[vc_column_text]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\"><strong>Q&amp;A: Wie funktioniert ein EDR?<\/strong> Zur Erkennung ausgekl\u00fcgelter Cyberangriffe erkennt die EDR verd\u00e4chtige und anormale Verhaltensweisen anhand von bestimmten Anhaltspunkten (IoC - Indicators of Compromise). Dabei handelt es sich nicht immer um au\u00dfergew\u00f6hnliche Ereignisse, sondern auch um banale Aktionen wie das \u00d6ffnen einer Verbindung auf einem externen Server. Sobald diese verd\u00e4chtigen Verhaltensweisen festgestellt wurden, empfiehlt die EDR-L\u00f6sung schnelle Abhilfema\u00dfnahmen und erm\u00f6glicht eine sp\u00e4tere Untersuchung anhand der Analyseergebnisse.<\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/2\" css=\".vc_custom_1708696718516{padding-top: 32px !important;padding-right: 32px !important;padding-bottom: 32px !important;padding-left: 32px !important;background-color: #f9f9f9 !important;}\"]<span class=\"separator_with_icon\" style=\"color:#060051\"><i class=\"fa fa-question\"><\/i><\/span>[vc_column_text]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\"><strong>Q&amp;A: EDR oder XDR?<\/strong> F\u00fcr Tools zum Schutz der Endger\u00e4te ist es unerl\u00e4sslich, eine Detektion und Incident Response zu integrieren. Zus\u00e4tzlich zur EDR-Informatik will die XDR-Plattform (eXtended Detection and Response) alle internen und externen IT-Verm\u00f6genswerte (Netzwerk, Verzeichnisse, Cloud-Ressourcen, Firewalls etc.) sammeln, um einen \u00dcberblick \u00fcber die Ereignisse des Informationssystems zu geben.[\/vc_column_text][vc_empty_space][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"full_width\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\"][vc_column][vc_column_text]<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=&#8220;&#8220; row_type=&#8220;row&#8220; use_row_as_full_screen_section=&#8220;no&#8220; type=&#8220;grid&#8220; angled_section=&#8220;no&#8220; text_align=&#8220;left&#8220; background_image_as_pattern=&#8220;without_pattern&#8220; z_index=&#8220;&#8220; padding_top=&#8220;50&#8243; padding_bottom=&#8220;50&#8243; css=&#8220;.vc_custom_1708942368363{background-color: #ffffff !important;}&#8220;][vc_column][vc_row_inner row_type=&#8220;row&#8220; type=&#8220;full_width&#8220; text_align=&#8220;left&#8220; css_animation=&#8220;&#8220;][vc_column_inner][vc_empty_space][vc_column_text] Endpoint Detection &amp; Response (EDR) zum Schutz Ihrer Terminals [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8220;&#8220; row_type=&#8220;row&#8220; use_row_as_full_screen_section=&#8220;no&#8220; type=&#8220;grid&#8220; angled_section=&#8220;no&#8220; text_align=&#8220;left&#8220; background_image_as_pattern=&#8220;without_pattern&#8220; z_index=&#8220;&#8220; padding_top=&#8220;50&#8243; padding_bottom=&#8220;50&#8243;][vc_column][vc_row_inner row_type=&#8220;row&#8220; type=&#8220;full_width&#8220; text_align=&#8220;left&#8220; css_animation=&#8220;&#8220;][vc_column_inner width=&#8220;3\/4&#8243; css=&#8220;.vc_custom_1708939697175{padding-right: 32px&#8230;<\/p>\n","protected":false},"author":31,"featured_media":0,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"full_width.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-506082","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>EDR - Endpoint Detection &amp; Response, Schutz f\u00fcr Ihre Ger\u00e4te<\/title>\n<meta name=\"description\" content=\"Endpoint Detection &amp; Response, EDR-Cybersicherheitsl\u00f6sungen der n\u00e4chsten Generation zur St\u00e4rkung der Endger\u00e4tesicherheit.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/de\/edr\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EDR - Endpoint Detection &amp; Response, Schutz f\u00fcr Ihre Ger\u00e4te\" \/>\n<meta property=\"og:description\" content=\"Endpoint Detection &amp; Response, EDR-Cybersicherheitsl\u00f6sungen der n\u00e4chsten Generation zur St\u00e4rkung der Endger\u00e4tesicherheit.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/de\/edr\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-16T12:27:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/stormshield_logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"204\" \/>\n\t<meta property=\"og:image:height\" content=\"94\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/de\\\/edr\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/de\\\/edr\\\/\",\"name\":\"EDR - Endpoint Detection & Response, Schutz f\u00fcr Ihre Ger\u00e4te\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/de\\\/#website\"},\"datePublished\":\"2024-02-29T15:53:03+00:00\",\"dateModified\":\"2024-09-16T12:27:50+00:00\",\"description\":\"Endpoint Detection & Response, EDR-Cybersicherheitsl\u00f6sungen der n\u00e4chsten Generation zur St\u00e4rkung der Endger\u00e4tesicherheit.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/de\\\/edr\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/de\\\/edr\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/de\\\/edr\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Endpoint Detection &#038; Response &#8211; EDR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/de\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EDR - Endpoint Detection & Response, Schutz f\u00fcr Ihre Ger\u00e4te","description":"Endpoint Detection & Response, EDR-Cybersicherheitsl\u00f6sungen der n\u00e4chsten Generation zur St\u00e4rkung der Endger\u00e4tesicherheit.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/de\/edr\/","og_locale":"de_DE","og_type":"article","og_title":"EDR - Endpoint Detection & Response, Schutz f\u00fcr Ihre Ger\u00e4te","og_description":"Endpoint Detection & Response, EDR-Cybersicherheitsl\u00f6sungen der n\u00e4chsten Generation zur St\u00e4rkung der Endger\u00e4tesicherheit.","og_url":"https:\/\/www.stormshield.com\/de\/edr\/","og_site_name":"Stormshield","article_modified_time":"2024-09-16T12:27:50+00:00","og_image":[{"width":204,"height":94,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/stormshield_logo.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@Stormshield","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/de\/edr\/","url":"https:\/\/www.stormshield.com\/de\/edr\/","name":"EDR - Endpoint Detection & Response, Schutz f\u00fcr Ihre Ger\u00e4te","isPartOf":{"@id":"https:\/\/www.stormshield.com\/de\/#website"},"datePublished":"2024-02-29T15:53:03+00:00","dateModified":"2024-09-16T12:27:50+00:00","description":"Endpoint Detection & Response, EDR-Cybersicherheitsl\u00f6sungen der n\u00e4chsten Generation zur St\u00e4rkung der Endger\u00e4tesicherheit.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/de\/edr\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/de\/edr\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/de\/edr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/de\/"},{"@type":"ListItem","position":2,"name":"Endpoint Detection &#038; Response &#8211; EDR"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/de\/#website","url":"https:\/\/www.stormshield.com\/de\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/de\/wp-json\/wp\/v2\/pages\/506082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.stormshield.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/de\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/de\/wp-json\/wp\/v2\/comments?post=506082"}],"version-history":[{"count":7,"href":"https:\/\/www.stormshield.com\/de\/wp-json\/wp\/v2\/pages\/506082\/revisions"}],"predecessor-version":[{"id":571000,"href":"https:\/\/www.stormshield.com\/de\/wp-json\/wp\/v2\/pages\/506082\/revisions\/571000"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/de\/wp-json\/wp\/v2\/media?parent=506082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}