{"id":3226,"date":"2025-05-19T12:49:21","date_gmt":"2025-05-19T12:49:21","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=3226"},"modified":"2025-05-19T12:49:21","modified_gmt":"2025-05-19T12:49:21","slug":"how-fidelis-elevate-achieves-active-threat-detection","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=3226","title":{"rendered":"How Fidelis Elevate\u00ae Achieves Active Threat Detection"},"content":{"rendered":"<div class=\"elementor elementor-36244\">\n<div class=\"elementor-element elementor-element-73dc9ed e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-577a40f elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW19828338 BCX8\"><span class=\"NormalTextRun SCXW19828338 BCX8\">Modern security teams face a dual challenge: <\/span><span class=\"NormalTextRun SCXW19828338 BCX8\">they\u2019re<\/span><span class=\"NormalTextRun SCXW19828338 BCX8\"> bombarded with alerts while still missing critical signals that <\/span><span class=\"NormalTextRun SCXW19828338 BCX8\">indicate<\/span><span class=\"NormalTextRun SCXW19828338 BCX8\"> real threats. Fidelis Active Threat Detection tackles this problem by correlating weak signals across multiple phases of attacks, transforming them into actionable intelligence. <\/span><span class=\"NormalTextRun SCXW19828338 BCX8\">Let\u2019s<\/span><span class=\"NormalTextRun SCXW19828338 BCX8\"> examine the technical mechanics behind this capability within the <\/span><span class=\"NormalTextRun SCXW19828338 BCX8\">Fidelis Elevate\u00ae<\/span><span class=\"NormalTextRun SCXW19828338 BCX8\"> platform.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f2c946f e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-90e9ff7 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">The Technical Foundation of Active Threat Detection<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0e7034d elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW117400706 BCX8\">Fidelis Active Threat Detection<\/span><span class=\"NormalTextRun SCXW117400706 BCX8\">\u2122<\/span> <span class=\"NormalTextRun SCXW117400706 BCX8\">operates<\/span><span class=\"NormalTextRun SCXW117400706 BCX8\"> as an integral <\/span><span class=\"NormalTextRun SCXW117400706 BCX8\">component<\/span><span class=\"NormalTextRun SCXW117400706 BCX8\"> of the <\/span><span class=\"NormalTextRun SCXW117400706 BCX8\"><a href=\"https:\/\/fidelissecurity.com\/fidelis-elevate-extended-detection-and-response-xdr-platform\/\">Fidelis Elevate<\/a>\u00ae<\/span><span class=\"NormalTextRun SCXW117400706 BCX8\"> XDR framework. Rather than functioning as a standalone solution, it <\/span><span class=\"NormalTextRun SCXW117400706 BCX8\">leverages<\/span><span class=\"NormalTextRun SCXW117400706 BCX8\"> multiple data streams from across the security infrastructure to build comprehensive threat intelligence.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-294af4a elementor-widget elementor-widget-image\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d5fb8c6 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Deep Session Inspection: The Core Detection Engine<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f118203 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW131009990 BCX8\"><span class=\"NormalTextRun SCXW131009990 BCX8\">At the foundation of <\/span><span class=\"NormalTextRun SCXW131009990 BCX8\">Fidelis <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW131009990 BCX8\">Elevate\u00ae<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW131009990 BCX8\">\u2018s<\/span><span class=\"NormalTextRun SCXW131009990 BCX8\"> threat detection capabilities is its patented <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/network-security\/deep-session-inspection\/\">Deep Session Inspection<\/a><\/span><span class=\"NormalTextRun SCXW131009990 BCX8\">\u00ae<\/span><span class=\"NormalTextRun SCXW131009990 BCX8\"> technology. Unlike conventional traffic monitoring systems that evaluate only headers or basic packet data, this technology:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-3bd5099 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Processes traffic at speeds up to 20 GB through specialized 1U sensors<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Inspects content across all network ports and protocols<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Reconstructs and analyzes complete sessions rather than isolated packets<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Detects threats concealed within nested files and complex data structures<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Seamlessly integrates with third-party decryption technologies to examine encrypted traffic both in-line and out-of-band<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Monitors ephemeral and containerized workloads that frequently escape detection<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-16563ad elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW251129528 BCX8\"><span class=\"NormalTextRun SCXW251129528 BCX8\">This deep inspection creates the raw signal data that feeds into the threat detection correlation system.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d89b982 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Continuous Terrain Mapping and Risk Assessment<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-03ab199 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW141606858 BCX8\"><span class=\"NormalTextRun SCXW141606858 BCX8\">For <\/span><span class=\"NormalTextRun SCXW141606858 BCX8\">accurate<\/span><span class=\"NormalTextRun SCXW141606858 BCX8\"> threat detection, <\/span><span class=\"NormalTextRun SCXW141606858 BCX8\">Fidelis Elevate\u00ae<\/span><span class=\"NormalTextRun SCXW141606858 BCX8\"> first <\/span><span class=\"NormalTextRun SCXW141606858 BCX8\">establishes<\/span><span class=\"NormalTextRun SCXW141606858 BCX8\"> comprehensive visibility through:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9ef804e elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Real-time inventory collection across on-premises and cloud environments<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Asset classification and risk profiling<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/fidelissecurity.com\/threatgeek\/network-security\/network-traffic-pattern-analysis\/\">Network traffic pattern analysis<\/a><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Data flow monitoring<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Configuration assessment<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-fe4c61c elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW266928089 BCX8\"><span class=\"NormalTextRun SCXW266928089 BCX8\">This environmental awareness creates the contextual backdrop against which potential threat signals are evaluated.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e6a48b3 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-8dcb7d2 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">The Signal Correlation Mechanism<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ba060fa elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW36832542 BCX8\"><span class=\"NormalTextRun SCXW36832542 BCX8\">The actual mechanics of Active Threat Detection involve several distinct technical processes:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0731a4b elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Signal Aggregation from Multiple Sources<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6f52209 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW540358 BCX8\"><span class=\"NormalTextRun SCXW540358 BCX8\">Fidelis Elevate\u00ae<\/span><span class=\"NormalTextRun SCXW540358 BCX8\"> aggregates data from multiple detection vectors:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a61b297 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Network traffic analysis alerts from <a href=\"https:\/\/fidelissecurity.com\/solutions\/network-detection-and-response-ndr\/\">Fidelis Network<\/a>\u00ae<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Deception environment triggers from <a href=\"https:\/\/fidelissecurity.com\/solutions\/deception\/\">Fidelis Deception<\/a>\u00ae<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Endpoint detections from <a href=\"https:\/\/fidelissecurity.com\/solutions\/endpoint-detection-and-response-edr-solution\/\">Fidelis Endpoint<\/a>\u00ae or third-party EDR solutions<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/fidelissecurity.com\/threatgeek\/threat-detection-response\/sandboxing\/\">Sandbox<\/a> execution results for suspicious files<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9abf3a6 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Proprietary Correlation Algorithms<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-bbfff0a elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW21789915 BCX8\"><span class=\"NormalTextRun SCXW21789915 BCX8\">These signals then undergo analysis using proprietary algorithms that:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d33b54f elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Identify potentially related events across different security layers<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Apply temporal correlation to establish potential attack sequences<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Evaluate indicators against baseline behavioral patterns<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Filter out noise and false positives using contextual intelligence<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Identify connections based on threat actor profiles and TTPs <\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9ba0c62 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">MITRE ATT&amp;CK Framework Mapping<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e3770bd elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW267085431 BCX8\"><span class=\"NormalTextRun SCXW267085431 BCX8\">A crucial technical element is the automatic mapping to the MITRE ATT&amp;CK framework, which:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-35d95e8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Categorizes observed techniques according to established attack patterns<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Supplements proprietary detection with industry-standard classification<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Enables defenders to understand the attack stage and potential next steps<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Provides a common language for threat analysis and response<\/span><\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-45d7d7ae e-con-full post-cta-section e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-30c21c25 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-heading-title elementor-size-default\">Don\u2019t Let Weak Signals Become Missed Threats<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-c0359b2 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW211827286 BCX8\"><span class=\"NormalTextRun SCXW211827286 BCX8\">Act now to stop what others overlook \u2014 before the breach happens. <span class=\"TextRun SCXW55169989 BCX8\"><span class=\"NormalTextRun SCXW55169989 BCX8\">Download the Free Data<\/span><span class=\"NormalTextRun SCXW55169989 BCX8\">s<\/span><span class=\"NormalTextRun SCXW55169989 BCX8\">heet to Discover:<\/span><\/span><\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6d70194f elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ways to eliminate alert fatigue<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Insight into the detection-to-remediation process<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Mapping threat signals<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-55a5293c elementor-widget elementor-widget-button\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/fidelissecurity.com\/resource\/datasheet\/active-threat-detection\/\"><br \/>\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\"><br \/>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download Now<\/span><br \/>\n\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-fa8a933 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-973adb6 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">The Technical Workflow of Active Threat Detection<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-bfbfc5a elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW250808803 BCX8\"><span class=\"NormalTextRun SCXW250808803 BCX8\">In practice, Active Threat Detection follows a defined technical process flow:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-3903d02 elementor-widget elementor-widget-image\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-59454b3 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Signal Collection: The system continuously gathers indicators from across the security environment, generating a stream of potential threat data.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Initial Filtering: Basic noise reduction removes obvious false positives and low-significance events.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Correlation Engine Processing: The remaining signals undergo correlation analysis using the proprietary algorithms described above.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Confidence Scoring: Each potential threat pattern receives a confidence score based on the strength, number, and relationships between correlated signals.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Conclusion Generation: For high-confidence detections, the system generates an &#8220;Active Threat&#8221; conclusion containing detailed evidence and attack context.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Response Integration: These conclusions integrate with automated response workflows and analyst investigation tools.<\/span><\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ee41b0e e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-bbf132c elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Technical Integration with the Security Stack<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-cbfd1f3 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW191028730 BCX8\"><span class=\"NormalTextRun SCXW191028730 BCX8\">As an open <a href=\"https:\/\/fidelissecurity.com\/fidelis-elevate-extended-detection-and-response-xdr-platform\/\">XDR platform<\/a>, <\/span><span class=\"NormalTextRun SCXW191028730 BCX8\">Fidelis <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW191028730 BCX8\">Elevate\u00ae<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW191028730 BCX8\">\u2018s<\/span><span class=\"NormalTextRun SCXW191028730 BCX8\"> Active Threat Detection integrates with existing security infrastructure via:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-541e609 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">REST APIs for bidirectional data exchange<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Out-of-the-box connectors for common security platforms<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Custom integration options through the Fidelis API<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Webhook-based alert forwarding<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d400e40 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW90567487 BCX8\"><span class=\"NormalTextRun SCXW90567487 BCX8\">This integration ensures that Active Threat Detection enhances rather than duplicates existing security investments.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-63ddc99 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-133fdd4 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Real-World Technical Implementation<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5b46105 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW78725596 BCX8\">In practical deployment, Active Threat Detection <\/span><span class=\"NormalTextRun SCXW78725596 BCX8\">demonstrates<\/span><span class=\"NormalTextRun SCXW78725596 BCX8\"> several key technical capabilities:<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ace671c elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Threat Pattern Recognition<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7792e90 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW248390436 BCX8\"><span class=\"NormalTextRun SCXW248390436 BCX8\">The system recognizes complex threat patterns, including:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e9b3bce elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Multi-stage attack sequences spanning days or weeks<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Living-off-the-land techniques using legitimate tools<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Supply chain <a href=\"https:\/\/fidelissecurity.com\/cybersecurity-101\/threat-intelligence\/indicators-of-compromise-ioc\/\">compromise indicators<\/a><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Command-and-control communications hidden in legitimate traffic<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f4f9d39 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Real-Time Processing Architecture<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-18b907e elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW195479914 BCX8\"><span class=\"NormalTextRun SCXW195479914 BCX8\">The underlying architecture enables:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4c47fa9 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Parallel processing of multiple threat signals<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Near real-time correlation of disparate events<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Dynamic updating of threat conclusions as new evidence emerges<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Continuous recalibration of detection algorithms based on new intelligence<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-594ecc4 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Forensic Evidence Collection <\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-38a98a6 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW104583876 BCX8\"><span class=\"NormalTextRun SCXW104583876 BCX8\">For each Active Threat detection, the system automatically preserves:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0f84136 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Relevant network traffic captures<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Process execution logs<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">File access records<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Authentication events<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Configuration changes<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-34676d4 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW242158770 BCX8\"><span class=\"NormalTextRun SCXW242158770 BCX8\">This evidence collection happens automatically as threats are detected, creating a comprehensive record for investigation.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9e95014 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-de3cd0e elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Technical Benefits of the Approach<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a7d63fc elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW78261811 BCX8\"><span class=\"NormalTextRun SCXW78261811 BCX8\">The technical design of Active Threat Detection offers several distinct advantages:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-db6bcd4 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Reduced False Positives <\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-fecb5d0 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW73063294 BCX8\"><span class=\"NormalTextRun SCXW73063294 BCX8\">By correlating multiple signals before generating alerts, the system dramatically reduces false positives compared to traditional point solutions.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-cd9bcdd elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Increased Detection Confidence<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f2153d8 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW69655444 BCX8\"><span class=\"NormalTextRun SCXW69655444 BCX8\">The confidence scoring mechanism ensures analysts receive high-quality alerts with sufficient supporting evidence for immediate action.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-cb6019e elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Enhanced Investigation Efficiency<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f2cfc19 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW254715758 BCX8\"><span class=\"NormalTextRun SCXW254715758 BCX8\">Detailed contextual information and evidence preservation streamline the investigation process, reducing time-to-remediation.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4f4a16e elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Continuous Security Improvement<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f5a74a9 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>The system\u2019s intelligence grows over time through:<\/span><span>\u00a0<\/span><\/p>\n<p><span><a href=\"https:\/\/fidelissecurity.com\/threatgeek\/xdr-security\/xdr-machine-learning\/\">Machine learning algorithms<\/a> that refine detection patterns<\/span><span>\u00a0<\/span><span>New correlation rules based on emerging threats<\/span><span>\u00a0<\/span><span>Automatic incorporation of threat intelligence<\/span><span>\u00a0<\/span><span>Feedback loops from analyst investigations<\/span>\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e5d874b e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-0e44043 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-995a8ab elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW12090507 BCX8\"><span class=\"NormalTextRun SCXW12090507 BCX8\">Fidelis Active Threat Detection<\/span><span class=\"NormalTextRun SCXW12090507 BCX8\">\u2122<\/span> <span class=\"NormalTextRun SCXW12090507 BCX8\">represents<\/span><span class=\"NormalTextRun SCXW12090507 BCX8\"> a sophisticated technical approach to the modern threat detection challenge. By correlating weak signals across multiple security layers, mapping findings to known attack patterns, and providing rich contextual intelligence<\/span><span class=\"NormalTextRun SCXW12090507 BCX8\">,<\/span><span class=\"NormalTextRun SCXW12090507 BCX8\"> it empowers security teams to detect and respond to threats that might otherwise go unnoticed. The integration of this capability within the broader <\/span><span class=\"NormalTextRun SCXW12090507 BCX8\">Fidelis Elevate\u00ae<\/span><span class=\"NormalTextRun SCXW12090507 BCX8\"> platform creates a comprehensive security solution that addresses the full attack lifecycle, from <\/span><span class=\"NormalTextRun SCXW12090507 BCX8\">initial<\/span><span class=\"NormalTextRun SCXW12090507 BCX8\"> detection through investigation and response.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-47fbf844 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-3d8182d0 elementor-cta--skin-cover elementor-widget elementor-widget-call-to-action\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-cta\">\n<div class=\"elementor-cta__bg-wrapper\">\n<div class=\"elementor-cta__bg elementor-bg\"><\/div>\n<div class=\"elementor-cta__bg-overlay\"><\/div>\n<\/div>\n<div class=\"elementor-cta__content\">\n<div class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tExplore how Fidelis Security can help you!\t\t\t\t\t<\/div>\n<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item \">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/fidelissecurity.com\/get-a-demo\/\"><br \/>\n\t\t\t\t\t\tTalk to an Expert\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>The post <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/xdr-security\/active-threat-detection-with-fidelis-elevate\/\">How Fidelis Elevate\u00ae Achieves Active Threat Detection<\/a> appeared first on <a href=\"https:\/\/fidelissecurity.com\/\">Fidelis Security<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Modern security teams face a dual challenge: they\u2019re bombarded with alerts while still missing critical signals that indicate real threats. Fidelis Active Threat Detection tackles this problem by correlating weak signals across multiple phases of attacks, transforming them into actionable intelligence. Let\u2019s examine the technical mechanics behind this capability within the Fidelis Elevate\u00ae platform. The [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":3227,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-3226","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/3226"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3226"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/3226\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/3227"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}