Category: Response

Discover effective Cybersecurity Response strategies in our articles. Learn how to handle and recover from security incidents efficiently.

July 16, 2024

Datto’s EDR and AV Solutions Secure 99.62% Malware Detection Efficacy in Miercom’s Study

Marketing

Discover how Datto’s EDR and AV solutions achieved a 99.62% malware detection efficacy in Miercom’s independent study, surpassing industry averages.

Read Now
July 11, 2023

Ransomware Rollback Now Included With Datto Endpoint Detection and Response

Chris McKie

New ability recovers files typically lost to ransomware attacks.

Read Now
December 13, 2022

Is your organization prepared for cyberattacks? Here’s how to get ready.

Amy Gardner

Get tips on preparing a business for a security challenge including insight from Kaseya CISO Jason Manar.

Read Now
November 16, 2022

What is Datto EDR? Why MSPs Need Endpoint Detection and Response

David Weiss

While installing antivirus (AV) on each endpoint used to be sufficient, advanced endpoint threat detection and response (EDR) is now a must to better protect against costly attacks.

Read Now
October 17, 2022

What is Managed SOC (Security Operation Center)? Why MSPs need MDR

David Weiss

Managed SOC provides the highest level of threat protection to MSPs and their clients. It combines technology solutions with expert human teams for advanced threat hunting, monitoring and incident response.

Read Now
July 29, 2022

The Common Types of Data Breaches

George Rouse

With so much confidential and personal information being shared online, it’s not surprising that data breaches have become more common.

Read Now
July 28, 2022

What Is a Security Data Breach?

George Rouse

Managed service providers (MSPs) can help protect clients from the impact of a data breach by securing their systems and educating clients about how to recognize an attack.

Read Now
May 28, 2022

What Is Endpoint Detection and Response (EDR)?

George Rouse

Endpoint detection and response is a layered, integrated endpoint security solution that monitors end-user devices continuously in addition to collecting endpoint data with a rule-based automated response.

Read Now
February 28, 2022

10 Considerations Before Buying an Endpoint Detection and Response (EDR) Security Solution – Part 2

Elizabeth Fichtner

Part two of a two-part blog series exploring important considerations when purchasing an endpoint detection and response (EDR) security solution or EDR tool for your organization.

Read Now