{"id":19783,"date":"2019-11-06T15:28:50","date_gmt":"2019-11-06T20:28:50","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=19783"},"modified":"2020-10-05T15:37:13","modified_gmt":"2020-10-05T19:37:13","slug":"bitdefender-with-endpoint-detection-and-response-edr","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/bitdefender-with-endpoint-detection-and-response-edr\/","title":{"rendered":"Bitdefender with Endpoint Detection and Response (EDR)"},"content":{"rendered":"<p>Enterprises are operating in a highly dynamic business environment, indicated by the rapid integration of high-tech devices and strategies. However, as organizations continue to leverage the cloud and manage hundreds of devices, they are facing increased threats to the sanctity of their data.<\/p>\n<p>Not only have data breaches continued to rise, but cybercriminals are becoming more dangerous in their attempts to steal precious organizational data. Research into the top ten breaches of the past decade shows that approximately <a href=\"https:\/\/www.csoonline.com\/article\/2130877\/data-breach\/the-biggest-data-breaches-of-the-21st-century.html\" target=\"_blank\" rel=\"noopener noreferrer\">4 billion people have been affected<\/a> by such occurrences \u2013 and that\u2019s just the top ten.<\/p>\n<p>&nbsp;<\/p>\n<h3><a href=\"https:\/\/www.sherweb.com\/security\/bitdefender\/\" target=\"_blank\" rel=\"noopener noreferrer\">Learn more about the next generation of AI-powered antivirus<\/a><\/h3>\n<p>&nbsp;<\/p>\n<p>With cyberattacks growing in number and maturing in sophistication, MSPs are actively pursuing <a href=\"https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">advanced security offerings<\/a> that allow them to level up security beyond the means of traditional antivirus.<\/p>\n<p>Conventional online tools don\u2019t provide the enhanced visibility required to identify and mitigate the danger posed by determined threat actors. In response, Bitdefender\u2019s Endpoint Detection and Response (EDR) technology has emerged as one of the most promising tools aimed to counter modern cyberattacks as it provides advanced insights into endpoint activities.<\/p>\n<p>&nbsp;<\/p>\n<h2>What is endpoint detection and response (EDR)?<\/h2>\n<p>In simple terms, EDR monitors system activities and events that take place on network endpoints to allow administrators enhanced visibility. Therefore, they can identify any unusual or threatening incidents that would otherwise remain invisible.<\/p>\n<p>An ideal EDR tool is responsible for many activities, ranging from investigating incident data and validating suspicious activity to stopping it on time.<\/p>\n<h3>Why is it important?<\/h3>\n<p>Contemporary workplaces have expanded beyond the conventional network of company servers and computer systems that work together in an enclosed environment. With rapid advancements in the field of personal gadgets, coupled with the rise of the BYOD (bring your own device) era, present-day offices are home to hundreds of devices operating at the endpoint of company servers.<\/p>\n<p>Consider this: Gartner predicts that the number of IoT devices deployed around the globe is expected to reach <a href=\"http:\/\/www.gartner.com\/newsroom\/id\/2905717\" target=\"_blank\" rel=\"noopener noreferrer\">25 billion by 2020.<\/a> And so, even though organizations conduct due diligence to protect their central servers through security protocols, endpoint devices still provide a way for hackers to access confidential data.<\/p>\n<p>Equipped with sophisticated technology, cybercriminals can siphon millions of dollars\u2019 worth of data without leaving any clue. By the time you know about it, it will be too late\u2013just ask <a href=\"https:\/\/www.csoonline.com\/article\/3444488\/equifax-data-breach-faq-what-happened-who-was-affected-what-was-the-impact.html\" target=\"_blank\" rel=\"noopener noreferrer\">Equifax<\/a>.<\/p>\n<p>That is where EDR proves to be invaluable. Utilizing behavioral analysis to identify threats, these systems allow you to trace and eliminate malicious intent activity before it accesses your central data.<\/p>\n<p>&nbsp;<\/p>\n<h2>Bitdefender endpoint detection and response: #1 ranked endpoint security solution<\/h2>\n<p>Using industry-leading standards and practices for threat mitigation and endpoint security, <a href=\"https:\/\/www.sherweb.com\/security\/bitdefender\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bitdefender\u2019s EDR solution<\/a> is carefully designed to apply a methodical approach to incident management.<\/p>\n<p>The Bitdefender GravityZone Ultra was developed to help MSPs bolster their endpoint security offerings, providing enhanced protection for their clients. Intuitively designed, the platform provides ease of use along with next-gen security options to accurately identify cyber threats and protect your systems.<\/p>\n<p>The entire endpoint protection system is carefully split into two distinct categories, which are further divided into separate tasks and processes. Here\u2019s how:<\/p>\n<h3>Detection<\/h3>\n<ul>\n<li>Constant monitoring and detection of any security-related incidents<\/li>\n<li>Security threat validation and risk prioritization<\/li>\n<li>Incident containment measures<\/li>\n<\/ul>\n<h3>Response<\/h3>\n<ul>\n<li>Investigating the incident to discover the reasons and vulnerabilities<\/li>\n<li>Applying the findings to fine-tune the security policy<\/li>\n<li>Implementing remediation measures to mitigate the impact<\/li>\n<\/ul>\n<p>With machine learning algorithms, Bitdefender GravityZone Ultra not only utilizes threat signatures to prevent known malware from accessing your server but also continues to learn and integrate new threat signatures from its database.<\/p>\n<p>Updated with the latest threat identifiers, the EDR software can pinpoint potentially malicious activity from your endpoint devices.<\/p>\n<p>&nbsp;<\/p>\n<h3>[BLOG] <a href=\"https:\/\/www.sherweb.com\/blog\/security\/start-reselling-bitdefender-antivirus-with-sherweb\/\" target=\"_blank\" rel=\"noopener noreferrer\">Start reselling Bitdefender antivirus with Sherweb<\/a><\/h3>\n<p>&nbsp;<\/p>\n<h2>How it works<\/h2>\n<p>So how does GravityZone Ultra protect your organization from the ever-growing threat of cyberattacks?<\/p>\n<p>The short answer is by formulating an entire chain of processes to help enterprises deal with the threat conclusively. By that, we mean starting from an accurate identification to containing it and more.<\/p>\n<p>Let\u2019s analyze the process in detail.<\/p>\n<h3>Step 1 \u2013 Identify<\/h3>\n<p>Bitdefender combines an entire group of technologies to monitor and record endpoint activity around the clock. Once the system picks up on suspicious activity or a series of events, the first action is to verify or identify it as a threat accurately.<\/p>\n<p>The GravityZone Ultra then takes immediate automated containment steps to mitigate the threat. However, if the machine learning algorithm does not find conclusive evidence, security personnel in charge is notified of the event.<\/p>\n<p>The platform grades threats are by severity, and they are accessible with a single click, allowing quick access for the security analyst to decide upon the status of the threat.<\/p>\n<h3>Step 2 \u2013 Contain<\/h3>\n<p>Containment also derives input from the previous step (Identify). If the detection mechanism confirms the event status as a verified \u2018threat,\u2019 then it deploys containment settings automatically.<\/p>\n<p>On the other hand, if a security analyst identifies a suspicious event as a threat, the software will assist them in quarantining the endpoint. It will add all affected malicious files to the block list. This prevents the malware from spreading organization-wide.<\/p>\n<h3>Step 3 \u2013 Eradication<\/h3>\n<p>Once you\u2019ve managed to stop the attack from spreading, it is imperative to focus on removing all traces to ensure that your servers can return to pre-attack normalcy.<\/p>\n<p>This allows you to function freely without fear of a reprise attack. For this, GravityZone Ultra comes with advanced \u2018disinfection and removal\u2019 technology that helps remove cyber threats once your server has identified them.<\/p>\n<p>For other types of attacks, security analysts can utilize registry backups, configuration tools, file managers, and more.<\/p>\n<h3>Step 4 \u2013 Recovery<\/h3>\n<p>This is the last step when dealing with a cyberattack. With Bitdefender\u2019s GravityZone Ultra, you can automatically rollback any file changes that were affected by the attack.<\/p>\n<p>But to remove complete endpoint infrastructural functionality, it is essential to have updated file backups in place.<\/p>\n<p>Also, GravityZone Ultra keeps monitoring the system even after the files are restored. Not only is this important to ensure that the attack is truly eradicated, but it also ensures that the restored endpoints are functioning at full capacity.<\/p>\n<h2>Endnote<\/h2>\n<p>As organizations continue to deal with an increasing number of endpoints, they face advanced threats originating from these devices. Hence, a comprehensive endpoint security solution, such as Bitdefender EDR, allows you to leverage the feasibility afforded by such devices in a safer environment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enterprises are operating in a highly dynamic business environment, indicated by the rapid integr","protected":false},"author":177,"featured_media":21938,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[862,863,864],"class_list":["post-19783","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-bitdefender","tag-edr","tag-antivirus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bitdefender with Endpoint Detection and Response (EDR) | Sherweb<\/title>\n<meta name=\"description\" content=\"Bitdefender\u2019s Endpoint Detection and Response (EDR) technology is one of the most promising tools aimed to counter modern cyberattacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/bitdefender-with-endpoint-detection-and-response-edr\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bitdefender with Endpoint Detection and Response (EDR) | Sherweb\" \/>\n<meta property=\"og:description\" content=\"Bitdefender\u2019s Endpoint Detection and Response (EDR) technology is one of the most promising tools aimed to counter modern cyberattacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/bitdefender-with-endpoint-detection-and-response-edr\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-06T20:28:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-05T19:37:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/EDR-1200x480@2x.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/bitdefender-with-endpoint-detection-and-response-edr\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/bitdefender-with-endpoint-detection-and-response-edr\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"Bitdefender with Endpoint Detection and Response (EDR)\",\"datePublished\":\"2019-11-06T20:28:50+00:00\",\"dateModified\":\"2020-10-05T19:37:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/bitdefender-with-endpoint-detection-and-response-edr\\\/\"},\"wordCount\":1082,\"commentCount\":4,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/bitdefender-with-endpoint-detection-and-response-edr\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/EDR-1200x480@2x.png\",\"keywords\":[\"Bitdefender\",\"EDR\",\"Antivirus\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/bitdefender-with-endpoint-detection-and-response-edr\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/bitdefender-with-endpoint-detection-and-response-edr\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/bitdefender-with-endpoint-detection-and-response-edr\\\/\",\"name\":\"Bitdefender with Endpoint Detection and Response (EDR) | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/bitdefender-with-endpoint-detection-and-response-edr\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/bitdefender-with-endpoint-detection-and-response-edr\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/EDR-1200x480@2x.png\",\"datePublished\":\"2019-11-06T20:28:50+00:00\",\"dateModified\":\"2020-10-05T19:37:13+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"Bitdefender\u2019s Endpoint Detection and Response (EDR) technology is one of the most promising tools aimed to counter modern cyberattacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/bitdefender-with-endpoint-detection-and-response-edr\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/bitdefender-with-endpoint-detection-and-response-edr\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/bitdefender-with-endpoint-detection-and-response-edr\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/EDR-1200x480@2x.png\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/EDR-1200x480@2x.png\",\"width\":2400,\"height\":920},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/bitdefender-with-endpoint-detection-and-response-edr\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Bitdefender with Endpoint Detection and Response (EDR)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bitdefender with Endpoint Detection and Response (EDR) | Sherweb","description":"Bitdefender\u2019s Endpoint Detection and Response (EDR) technology is one of the most promising tools aimed to counter modern cyberattacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/bitdefender-with-endpoint-detection-and-response-edr\/","og_locale":"en_US","og_type":"article","og_title":"Bitdefender with Endpoint Detection and Response (EDR) | Sherweb","og_description":"Bitdefender\u2019s Endpoint Detection and Response (EDR) technology is one of the most promising tools aimed to counter modern cyberattacks.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/bitdefender-with-endpoint-detection-and-response-edr\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2019-11-06T20:28:50+00:00","article_modified_time":"2020-10-05T19:37:13+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/EDR-1200x480@2x.png","type":"image\/png"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/bitdefender-with-endpoint-detection-and-response-edr\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/bitdefender-with-endpoint-detection-and-response-edr\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"Bitdefender with Endpoint Detection and Response (EDR)","datePublished":"2019-11-06T20:28:50+00:00","dateModified":"2020-10-05T19:37:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/bitdefender-with-endpoint-detection-and-response-edr\/"},"wordCount":1082,"commentCount":4,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/bitdefender-with-endpoint-detection-and-response-edr\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/EDR-1200x480@2x.png","keywords":["Bitdefender","EDR","Antivirus"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/bitdefender-with-endpoint-detection-and-response-edr\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/bitdefender-with-endpoint-detection-and-response-edr\/","url":"https:\/\/www.sherweb.com\/blog\/security\/bitdefender-with-endpoint-detection-and-response-edr\/","name":"Bitdefender with Endpoint Detection and Response (EDR) | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/bitdefender-with-endpoint-detection-and-response-edr\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/bitdefender-with-endpoint-detection-and-response-edr\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/EDR-1200x480@2x.png","datePublished":"2019-11-06T20:28:50+00:00","dateModified":"2020-10-05T19:37:13+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"Bitdefender\u2019s Endpoint Detection and Response (EDR) technology is one of the most promising tools aimed to counter modern cyberattacks.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/bitdefender-with-endpoint-detection-and-response-edr\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/bitdefender-with-endpoint-detection-and-response-edr\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/bitdefender-with-endpoint-detection-and-response-edr\/#primaryimage","url":"\/blog\/wp-content\/uploads\/EDR-1200x480@2x.png","contentUrl":"\/blog\/wp-content\/uploads\/EDR-1200x480@2x.png","width":2400,"height":920},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/bitdefender-with-endpoint-detection-and-response-edr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Bitdefender with Endpoint Detection and Response (EDR)"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Bitdefender","EDR","Antivirus"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/19783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=19783"}],"version-history":[{"count":10,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/19783\/revisions"}],"predecessor-version":[{"id":21939,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/19783\/revisions\/21939"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/21938"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=19783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=19783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=19783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}