{"id":1502,"date":"2022-06-29T11:08:02","date_gmt":"2022-06-29T09:08:02","guid":{"rendered":"https:\/\/cyber-detect.com\/?p=1502"},"modified":"2022-06-29T11:08:03","modified_gmt":"2022-06-29T09:08:03","slug":"cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr","status":"publish","type":"post","link":"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/","title":{"rendered":"Cybersecurity : why adopting Gorille\u00ae\ufffc in your EDR ?"},"content":{"rendered":"<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>When it comes to cybersecurity, using an EDR has become a prerequisite. Indeed, it is a full-fledged cyber defense component to protect its workstations.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>According to the military approach, building or using a cyber defense capability means mobilizing capabilities known under the NATO acronym &#8220;DOTMLPFI&#8221; :<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Doctrine#Military_usage\">Doctrine<\/a><\/li><li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Military_Organization\">Organization<\/a><\/li><li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Military_education_and_training\">Training<\/a><\/li><li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Materiel\">Materiel<\/a><\/li><li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Leadership\">Leadership<\/a><\/li><li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Military_personnel\">Personnel<\/a><\/li><li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Military_Base\">Facilities<\/a><\/li><li>Interoperability<\/li><\/ul>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The main added value of these capabilities is that they are based on <strong>anticipation<\/strong>.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>These cyber defense capabilities are based on:<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<ul class=\"wp-block-list\"><li>Open or classified sources,&nbsp;<\/li><li>Historicals,&nbsp;<\/li><li>Knowledge,&nbsp;<\/li><li>Contextualization (J6*),&nbsp;<\/li><li>Analysis management,&nbsp;<\/li><li>Aggregations,&nbsp;<\/li><li>Partial or systematic remediation scripts,&nbsp;<\/li><li>Expertise and participation in the definition of operations (J5\/hot plan) and their implementation (J3).<\/li><\/ul>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The current focus is naturally on automated software solutions (Materiel for the NATO acronym), such as probes, analysis, orchestration, etc. drastically saving time and human resources, when possible.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>These solutions are supposed to scale up (or scalable) and thus compensate for the long and manual processes of reverse engineering. However, time is often of the essence in case of an attack or alleged attack without really knowing the nature of the attack.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Thus, market solutions have been developed to help analysts, whether they are internal or external (MSSP SOC, SAAS, crisis management, subrogation, delegation, etc.).<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>These solutions are illustrated in the Gartner Group diagram called &#8220;TRIAD&#8221;. We have expanded it slightly to include other organizations that cannot be automated but are essential to the cyber defense process:<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"497\" height=\"370\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/03\/TRIAD-gartner-group.png\" alt=\"TRIAD-gartner-group\" class=\"wp-image-1468\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/03\/TRIAD-gartner-group.png 497w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/03\/TRIAD-gartner-group-300x223.png 300w\" sizes=\"auto, (max-width: 497px) 100vw, 497px\" \/><figcaption>Gartner Group TRIAD<\/figcaption><\/figure>\n<\/div><\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading\">The role and interest of an EDR<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>TRIAD distinguishes between tools grouped under the acronym &#8220;EDR*&#8221; whose installed and configured agents are able to isolate a file and present it to other analysis tools. Among the latter we have EPP (EndPoint Protection or classic signature-based AV), behavioral analysis tools based primarily on artificial intelligence (AI).&nbsp;<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>These tools have to deal with both known viruses (signature database) and unknown ones, descended from sophisticated malware, in variant form. By passing under the radar of these detection tools, these threats settle on the IS, remain dormant and are activated according to the attackers&#8217; triggers.&nbsp;<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The response to these attacks can be broken down into 3 steps: <strong>detection<\/strong>, <strong>malware characterization<\/strong>, and <strong>attack characterization<\/strong>.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>Malware detection&nbsp;:<\/strong><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>By abuse of language, detection takes over the rest of the analysis chain. Detecting is indeed a necessity that must be combined with characterizing the malware: knowing its nature, its action, its technical objective (wiper, ransomware, data-leaks, espionage, etc.), but it is insufficient. It is also necessary to characterize the threat in order to guarantee optimal protection.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>Malware characterization&nbsp;:<\/strong><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Malware analysis tools have to deal with 4 protection techniques implemented by attackers: obfuscation, self-modifying encryption and anti-debug measures.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>This incident handling segment is critical. It is at the core of the ITC*&#8217;s responsibilities to support analysts in the event of an attack. However, detection and characterization are time consuming, costly and reduce efficiency.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>Attack characterization :<\/strong><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>It relies heavily on well-managed malware characterization, which facilitates thorough research and provides optimal incident response at low cost.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Searching for IOCs, correlations or effects from a detection is risky and delays knowledge and incident response resources.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading\">Gorille<b style=\"white-space: normal;\"><span lang=\"EN-US\" style=\"font-size: 16pt; font-family: Calibri, sans-serif;\">\u00ae<\/span><\/b> as an extension of its EDR<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Beyond the technical aspect, it is necessary to carry out a debriefing on the situation of the attack(s), the infrastructure, the residual risks and to anticipate the other aspects of the handling of the incident (legal aspect, contractual responsibilities, etc.). This consists of exposing a situation and its probable evolution, this is situational awareness.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The market of cyber defense solutions is emerging, it draws its legitimacy both from each internal engine but also from the interoperability of several solutions forming a platform. It is essential to go beyond the traditional antivirus solutions and AI-based probes and turn to an innovative solution: <strong>morphological analysis<\/strong>.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>By characterizing a threat by its behavior and not only from a malware database, morphological analysis <strong>offers a unique accuracy on the identification of viruses and their variants<\/strong>. This analysis does not require a learning phase and can be materialized in the form of control flow graphs to precisely visualize the malicious strains of an executable file. This technology is embedded in the Gorille\u00ae solution engine.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Using morphological analysis, Gorille\u00ae Cloud has the ability to provide complete and instant <strong>characterization<\/strong> to inform analysts about the attack. It also integrates within an xDR* platform and targets endpoints, servers, but also incoming files and the supply chain.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Adopting Gorille\u00ae within an EDR platform guarantees a relevant and rapid analysis, and in 99% of cases, an automatic treatment of the incident. This avoids overly constrained tuning, risking blocking user workstations or production servers without justifying the nature of the attack and its repercussions.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h3 class=\"wp-block-heading\">To conclude,<\/h3>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p style=\"font-style:normal;font-weight:600\">Pairing Gorille\u00ae with an EDR means reducing your risks and minimizing your exposure to future claims. It also means keeping the possibility of negotiating its guarantee premiums by displaying good practices with a breakthrough tool.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p style=\"font-style:normal;font-weight:600\"><strong>The use of Gorille\u00ae acts on the four risk mechanisms that are :<\/strong><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<ul class=\"wp-block-list\" style=\"font-style:normal;font-weight:600\"><li><strong>probabilities of attack occurrence, deployment on the network and endpoints,<\/strong><\/li><li><strong>the threat already described above that would fly under the radar,<\/strong><\/li><li><strong>the vulnerability of cyber defenses,<\/strong><\/li><li>the effects in terms of loss of business, penalties, civil liability, etc.<\/li><\/ul>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p class=\"has-large-font-size\"><strong>GLOSSARY :<\/strong><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>DOTMLPFI<\/strong>*<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Doctrine, organization, training, materials, leadership and education, personnel, facilities and interoperability: The term refers to several distinct actions (<a href=\"https:\/\/www.nato.int\/cps\/fr\/natohq\/official_texts_156374.htm?selectedLocale=fr\">https:\/\/www.nato.int\/cps\/fr\/natohq\/official_texts_156374.htm?selectedLocale=fr<\/a>)<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>J3*<\/strong>. Operation (definition of actions, their sequences, their conduct). Defined as a long term need (cold plan) or short term need (hot plan). See J5.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>J6*<\/strong>. Information from all sources.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>J5*<\/strong>. Short and long term planning of capacity building.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>CTI<\/strong>*<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Cyberthreat Intelligence or Anticipation. Sources and means of analysis of attacks, whatever their timing (tactical, operative or strategic).<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>xDR<\/strong>*<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Regroups the so-called (E)ndpoint (D)etection and (R)esponse solutions in the form of an agent installed on the terminal, as well as (A)DR for Application Detection and Response, the best known of which are those that process horizontal or vertical\/business mails (Application). These agents scan the actions of the executable binary on the computer and isolate a suspicious file.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>Risks*<\/strong><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>4 properties: threats (malware), vulnerability, probability, effects and time axis one.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>Status Report*<\/strong><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>This involves reporting at several communication frequencies to give an idea of the attacks, their evolution, the state of the production and support systems (IS), the anticipation and the palliative operational solutions.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>When it comes to cybersecurity, using an EDR has become a prerequisite. Indeed, it is a full-fledged cyber defense component to protect its workstations.<\/p>\n","protected":false},"author":1,"featured_media":1482,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1502","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity : why adopting Gorille\u00ae\ufffc in your EDR ? - Cyber-Detect<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity : why adopting Gorille\u00ae\ufffc in your EDR ? - Cyber-Detect\" \/>\n<meta property=\"og:description\" content=\"When it comes to cybersecurity, using an EDR has become a prerequisite. Indeed, it is a full-fledged cyber defense component to protect its workstations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber-Detect\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-29T09:08:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-29T09:08:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/03\/david-scanlon-YDXbXMJ5UGM-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1911\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"adminbilliotte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"adminbilliotte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/\"},\"author\":{\"name\":\"adminbilliotte\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47\"},\"headline\":\"Cybersecurity : why adopting Gorille\u00ae\ufffc in your EDR ?\",\"datePublished\":\"2022-06-29T09:08:02+00:00\",\"dateModified\":\"2022-06-29T09:08:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/\"},\"wordCount\":1071,\"publisher\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/03\/david-scanlon-YDXbXMJ5UGM-unsplash-scaled.jpg\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/\",\"url\":\"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/\",\"name\":\"Cybersecurity : why adopting Gorille\u00ae\ufffc in your EDR ? - Cyber-Detect\",\"isPartOf\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/03\/david-scanlon-YDXbXMJ5UGM-unsplash-scaled.jpg\",\"datePublished\":\"2022-06-29T09:08:02+00:00\",\"dateModified\":\"2022-06-29T09:08:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/#primaryimage\",\"url\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/03\/david-scanlon-YDXbXMJ5UGM-unsplash-scaled.jpg\",\"contentUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/03\/david-scanlon-YDXbXMJ5UGM-unsplash-scaled.jpg\",\"width\":2560,\"height\":1911,\"caption\":\"EDR-Gorilla\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyber-detect.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity : why adopting Gorille\u00ae\ufffc in your EDR ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"name\":\"Cyber-Detect\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyber-detect.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\",\"name\":\"Cyber-Detect\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"contentUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"width\":728,\"height\":242,\"caption\":\"Cyber-Detect\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47\",\"name\":\"adminbilliotte\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g\",\"caption\":\"adminbilliotte\"},\"url\":\"https:\/\/cyber-detect.com\/en\/author\/adminbilliotte\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity : why adopting Gorille\u00ae\ufffc in your EDR ? - Cyber-Detect","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity : why adopting Gorille\u00ae\ufffc in your EDR ? - Cyber-Detect","og_description":"When it comes to cybersecurity, using an EDR has become a prerequisite. Indeed, it is a full-fledged cyber defense component to protect its workstations.","og_url":"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/","og_site_name":"Cyber-Detect","article_published_time":"2022-06-29T09:08:02+00:00","article_modified_time":"2022-06-29T09:08:03+00:00","og_image":[{"width":2560,"height":1911,"url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/03\/david-scanlon-YDXbXMJ5UGM-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"adminbilliotte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"adminbilliotte","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/#article","isPartOf":{"@id":"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/"},"author":{"name":"adminbilliotte","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47"},"headline":"Cybersecurity : why adopting Gorille\u00ae\ufffc in your EDR ?","datePublished":"2022-06-29T09:08:02+00:00","dateModified":"2022-06-29T09:08:03+00:00","mainEntityOfPage":{"@id":"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/"},"wordCount":1071,"publisher":{"@id":"https:\/\/cyber-detect.com\/en\/#organization"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/#primaryimage"},"thumbnailUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/03\/david-scanlon-YDXbXMJ5UGM-unsplash-scaled.jpg","articleSection":["Actualit\u00e9s"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/","url":"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/","name":"Cybersecurity : why adopting Gorille\u00ae\ufffc in your EDR ? - Cyber-Detect","isPartOf":{"@id":"https:\/\/cyber-detect.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/#primaryimage"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/#primaryimage"},"thumbnailUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/03\/david-scanlon-YDXbXMJ5UGM-unsplash-scaled.jpg","datePublished":"2022-06-29T09:08:02+00:00","dateModified":"2022-06-29T09:08:03+00:00","breadcrumb":{"@id":"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/#primaryimage","url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/03\/david-scanlon-YDXbXMJ5UGM-unsplash-scaled.jpg","contentUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/03\/david-scanlon-YDXbXMJ5UGM-unsplash-scaled.jpg","width":2560,"height":1911,"caption":"EDR-Gorilla"},{"@type":"BreadcrumbList","@id":"https:\/\/cyber-detect.com\/en\/cybersecurity-why-adopting-gorille%ef%bf%bc-in-your-edr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyber-detect.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity : why adopting Gorille\u00ae\ufffc in your EDR ?"}]},{"@type":"WebSite","@id":"https:\/\/cyber-detect.com\/en\/#website","url":"https:\/\/cyber-detect.com\/en\/","name":"Cyber-Detect","description":"","publisher":{"@id":"https:\/\/cyber-detect.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyber-detect.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyber-detect.com\/en\/#organization","name":"Cyber-Detect","url":"https:\/\/cyber-detect.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","contentUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","width":728,"height":242,"caption":"Cyber-Detect"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47","name":"adminbilliotte","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g","caption":"adminbilliotte"},"url":"https:\/\/cyber-detect.com\/en\/author\/adminbilliotte\/"}]}},"_links":{"self":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts\/1502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/comments?post=1502"}],"version-history":[{"count":1,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts\/1502\/revisions"}],"predecessor-version":[{"id":1503,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts\/1502\/revisions\/1503"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/media\/1482"}],"wp:attachment":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/media?parent=1502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/categories?post=1502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/tags?post=1502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}