You had me at product. you lost me at agent. If only I had a penny for the number of times I heard the under-deliver over-promise of lightweight, featherweight, welterweight, ANY-weight agent… Usually when the other side is talking, you start thinking how will you, again, justify it to the endpoint/IT team, in addition to all the other 20 agents you asked for.

Yes, technologies have improved tremendously, native-API approaches are more common, and often better trusted over a “new and innovative approach” — eventually bringing the endpoint to its knees. …


Connect the dots. Complete the picture.

56% of breaches took months or longer to discover” was one takeaway from the recent Verizon DBIR 2019. Unfortunately, this is not earth shattering news. The current state of time to detect and respond being unacceptable across the industry, regardless of who you ask.

In many cases it represents a reality that security teams need to face and prepare for. While we often look at the depth of discovery, or ability to detect, as a measure of security, we tend to ignore the element of time- retention.

One of the great Gartner blogs by Anton Chuvakin where he brings a…

Maor Franco

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store