{"id":4017,"date":"2025-07-18T17:02:20","date_gmt":"2025-07-18T17:02:20","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=4017"},"modified":"2025-07-18T17:02:20","modified_gmt":"2025-07-18T17:02:20","slug":"how-does-fidelis-ndr-delivers-proactive-asset-risk-mitigation","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=4017","title":{"rendered":"How does Fidelis NDR Delivers Proactive Asset Risk Mitigation?"},"content":{"rendered":"<div class=\"elementor elementor-36906\">\n<div class=\"elementor-element elementor-element-6ad63e9 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-5b440e6 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW194888991 BCX0\"><span class=\"NormalTextRun SCXW194888991 BCX0\">Organizations <\/span><span class=\"NormalTextRun SCXW194888991 BCX0\">operating<\/span><span class=\"NormalTextRun SCXW194888991 BCX0\"> in sprawling, hybrid IT environments often lack complete visibility into all assets and their communication patterns. This gap creates blind spots where vulnerabilities go undetected, third-party<\/span><span class=\"NormalTextRun SCXW194888991 BCX0\">\u00a0components <\/span><span class=\"NormalTextRun SCXW194888991 BCX0\">remain<\/span><span class=\"NormalTextRun SCXW194888991 BCX0\"> unpatched, and unauthorized lateral movement can occur without raising alarms.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW194888991 BCX0\"><span class=\"SCXW194888991 BCX0\">\u00a0<\/span><br \/><\/span><span class=\"TextRun SCXW194888991 BCX0\"><span class=\"NormalTextRun SCXW194888991 BCX0\">When unknown assets slip through discovery processes, attackers exploit them <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW194888991 BCX0\">quietly\u2014probing<\/span><span class=\"NormalTextRun SCXW194888991 BCX0\"> for weaknesses, injecting malicious payloads, and moving laterally across network segments before any signs of compromise appear. Legacy security tools generate overwhelming alert volumes without clear prioritization, leaving teams <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW194888991 BCX0\">to chase<\/span><span class=\"NormalTextRun SCXW194888991 BCX0\"> false positives while real threats slip by.<\/span><\/span><\/p>\n<p><span class=\"TextRun SCXW194888991 BCX0\"><span class=\"NormalTextRun SCXW194888991 BCX0\">This blog will <\/span><span class=\"NormalTextRun SCXW194888991 BCX0\">demonstrate<\/span><span class=\"NormalTextRun SCXW194888991 BCX0\"> a structured, proactive, risk-based<\/span><span class=\"NormalTextRun SCXW194888991 BCX0\">\u00a0asset protection <\/span><span class=\"NormalTextRun SCXW194888991 BCX0\">methodology<\/span><span class=\"NormalTextRun SCXW194888991 BCX0\"> using advanced Network Detection and Response (NDR). Readers will learn how to perform comprehensive asset discovery and classification, apply contextual risk scoring, detect threats within encrypted traffic, and <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/xdr-security\/cracking-threat-hunting-and-incident-response-with-xdr\/\">establish <\/a><\/span><a href=\"https:\/\/fidelissecurity.com\/threatgeek\/xdr-security\/cracking-threat-hunting-and-incident-response-with-xdr\/\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW194888991 BCX0\">threat <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW194888991 BCX0\">hunting<\/span><\/a><span class=\"NormalTextRun SCXW194888991 BCX0\"> and automated containment workflows\u2014all designed to shift security operations from reactive firefighting to strategic defense.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0180f66 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-8f1577a elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Why proactive vs reactive asset risk mitigation matters now<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-cd1ae4c elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Rapidly changing environments increase blind spots<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-093c0a4 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW208396291 BCX0\"><span class=\"NormalTextRun SCXW208396291 BCX0\">Today\u2019s digital infrastructure\u2014hybrid-cloud, SaaS apps, IoT\u2014expands your attack surface daily. Without continuous asset risk monitoring, new systems <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW208396291 BCX0\">go<\/span><span class=\"NormalTextRun SCXW208396291 BCX0\"> untracked and become prime targets. For example, a recently spun-up cloud instance without active discovery could harbor unpatched software, quietly becoming entry points. Addressing this requires proactive asset protection, not just reacting once attackers have slipped through.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-166f0eb elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Threat volumes overwhelm reactive defenses <\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-af2d476 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW60926205 BCX0\"><span class=\"NormalTextRun SCXW60926205 BCX0\">Cyber threats <\/span><span class=\"NormalTextRun SCXW60926205 BCX0\">aren\u2019t<\/span><span class=\"NormalTextRun SCXW60926205 BCX0\"> slowing down\u2014<\/span><span class=\"NormalTextRun SCXW60926205 BCX0\">they\u2019re<\/span><span class=\"NormalTextRun SCXW60926205 BCX0\"> automating. Malicious traffic, <a href=\"https:\/\/fidelissecurity.com\/cybersecurity-101\/learn\/lateral-movement\/\">lateral movement<\/a>, or minor reconnaissance can herald a larger breach. By the time alerts surface in legacy systems, attackers may have already <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW60926205 BCX0\">exfiltrated<\/span><span class=\"NormalTextRun SCXW60926205 BCX0\"> sensitive data. <\/span><span class=\"NormalTextRun SCXW60926205 BCX0\">That\u2019s<\/span><span class=\"NormalTextRun SCXW60926205 BCX0\"> why <\/span><\/span><span class=\"TextRun SCXW60926205 BCX0\"><span class=\"NormalTextRun SCXW60926205 BCX0\">real-time asset detection and response<\/span><\/span><span class=\"TextRun SCXW60926205 BCX0\"><span class=\"NormalTextRun SCXW60926205 BCX0\">, powered by proactive <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/network-security\/what-is-ndr-network-detection-and-response\/\">network threat detection<\/a>, is essential to get ahead of risk buildup.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a296163 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Asset value doesn\u2019t equate to asset visibility<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5e0b72a elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW58154649 BCX0\"><span class=\"NormalTextRun SCXW58154649 BCX0\">Not all assets are equally critical\u2014but without risk-based asset security, everything looks equally risky. This leads to noise, fatigue, and scattered effort. Organizations need to score assets contextually, focusing on high-value systems seen in the wild. <\/span><span class=\"NormalTextRun SCXW58154649 BCX0\">That\u2019s<\/span><span class=\"NormalTextRun SCXW58154649 BCX0\"> the core of <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/threats-and-vulnerabilities\/risk-based-vulnerability-management\/\">risk-based vulnerability management<\/a> and deciding where to <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW58154649 BCX0\">invest<\/span><span class=\"NormalTextRun SCXW58154649 BCX0\"> protection first.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-623511ed e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-39d44a19 e-con-full e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-3c406910 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-heading-title elementor-size-default\">Prioritize the right risks, protect what matters!<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1ae7b868 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Not all risks are equal\u2014learn how to find the weak spots before attackers do:<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Understanding Your Cyber Risk<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">How do you calculate risk?<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Protect your assets with risk assessment<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-35faf3cc elementor-widget elementor-widget-button\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/fidelissecurity.com\/resource\/datasheet\/fidelis-elevate-asset-risk-calculation\/\"><br \/>\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\"><br \/>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download Datasheet<\/span><br \/>\n\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2d5d7e36 e-con-full elementor-hidden-tablet elementor-hidden-mobile e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-18134588 elementor-widget elementor-widget-image\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b9d8e08 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-f4d8d82 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">What steps build a proactive, risk-based asset protection strategy?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-34bf82f elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Discover, classify, and map your entire cyber terrain<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7696956 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW252330868 BCX0\"><span class=\"NormalTextRun SCXW252330868 BCX0\">Asset risk security starts with visibility. If <\/span><span class=\"NormalTextRun SCXW252330868 BCX0\">you\u2019re<\/span><span class=\"NormalTextRun SCXW252330868 BCX0\"> blind to 30% of your infrastructure, attackers <\/span><span class=\"NormalTextRun SCXW252330868 BCX0\">aren\u2019t<\/span><span class=\"NormalTextRun SCXW252330868 BCX0\">. <a href=\"https:\/\/fidelissecurity.com\/use-case\/asset-discovery-awareness\/\">Automated asset discovery<\/a> <\/span><span class=\"NormalTextRun SCXW252330868 BCX0\">identifies<\/span><span class=\"NormalTextRun SCXW252330868 BCX0\"> servers, workstations, IoT, and cloud instances\u2014then profiles and classifies them based on sensitivity and vulnerability. That gives you a terrain map, revealing where <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW252330868 BCX0\">high\u00a0<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW252330868 BCX0\">value<\/span><span class=\"NormalTextRun SCXW252330868 BCX0\"> assets sit\u2014and where to focus first.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1906f2b elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Apply risk-based vulnerability management across assets<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2751e09 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW84615433 BCX0\"><span class=\"NormalTextRun SCXW84615433 BCX0\">Once assets are mapped, vulnerability scans add CVE context. But what matters is knowing which vulnerable assets are <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW84615433 BCX0\">exposed<\/span><span class=\"NormalTextRun SCXW84615433 BCX0\"> or targeted. By overlaying detection data on vulnerability results, teams can focus remediation on the most actively threatened systems\u2014aligning with <\/span><\/span><span class=\"TextRun SCXW84615433 BCX0\"><span class=\"NormalTextRun SCXW84615433 BCX0\">proactive vs reactive <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/threat-detection-response\/asset-profiling-context-driven-risk-mitigation\/\">asset risk mitigation<\/a><\/span><\/span><span class=\"TextRun SCXW84615433 BCX0\"><span class=\"NormalTextRun SCXW84615433 BCX0\"> best practices.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-569fc4d elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Establish behavioral baselines for threat hunting<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9ac531d elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW48323743 BCX0\"><span class=\"NormalTextRun SCXW48323743 BCX0\">Good defense relies on knowing what \u201cnormal\u201d looks like. Behavioral analytics learn <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW48323743 BCX0\">east<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW48323743 BCX0\">west<\/span><span class=\"NormalTextRun SCXW48323743 BCX0\"> and <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW48323743 BCX0\">north<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW48323743 BCX0\">south<\/span><span class=\"NormalTextRun SCXW48323743 BCX0\"> <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/network-security\/network-traffic-pattern-analysis\/\">traffic patterns<\/a>, login behavior, file flows, and application profiles. Threat hunting with NDR becomes meaningful when deviations are flagged early\u2014before reconnaissance or lateral movement <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW48323743 BCX0\">escalate<\/span><span class=\"NormalTextRun SCXW48323743 BCX0\">.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-80bd529 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Orchestrate responses to threats immediately<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1abe3c0 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW81597826 BCX0\"><span class=\"NormalTextRun SCXW81597826 BCX0\">Detection is just stage one\u2014response must follow. Predefined playbooks enable immediate actions: quarantining suspicious hosts, blocking data uploads, or triggering forensic workflows. When configured correctly, this enables <\/span><\/span><span class=\"TextRun SCXW81597826 BCX0\"><span class=\"NormalTextRun SCXW81597826 BCX0\">real-time asset detection and response<\/span><\/span><span class=\"TextRun SCXW81597826 BCX0\"><span class=\"NormalTextRun SCXW81597826 BCX0\">\u2014catching threats before they become breaches.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-99f7500 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Keep adapting defenses over time<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-35f6c76 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW137913467 BCX0\"><span class=\"NormalTextRun SCXW137913467 BCX0\">New assets are created; attack patterns evolve. Continuous tuning of asset risk scores, scan frequency, and response thresholds is essential. Proactive security <\/span><span class=\"NormalTextRun SCXW137913467 BCX0\">isn\u2019t<\/span><span class=\"NormalTextRun SCXW137913467 BCX0\"> \u201cset and forget\u201d\u2014<\/span><span class=\"NormalTextRun SCXW137913467 BCX0\">it\u2019s<\/span><span class=\"NormalTextRun SCXW137913467 BCX0\"> iterative, informed by new insights and actual incidents.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-01c9cce e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-aba0fef elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">How Fidelis NDR enables Proactive Risk-based Asset Protection<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-506cb5f elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW49551611 BCX0\"><span class=\"NormalTextRun SCXW49551611 BCX0\">Now\u2014how can <\/span><\/span><span class=\"TextRun SCXW49551611 BCX0\"><span class=\"NormalTextRun SCXW49551611 BCX0\"><a href=\"https:\/\/fidelissecurity.com\/solutions\/network-detection-and-response-ndr\/\">Fidelis Network<\/a>\u00ae NDR<\/span><\/span><span class=\"TextRun SCXW49551611 BCX0\"><span class=\"NormalTextRun SCXW49551611 BCX0\"> uniquely deliver these capabilities?<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-c23668a elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Deep Session Inspection enables full asset visibility<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e13ef51 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW136703147 BCX0\"><span class=\"NormalTextRun SCXW136703147 BCX0\"><strong>Problem:<\/strong> Encrypted and multi-protocol traffic hides signals.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW136703147 BCX0\"><span class=\"SCXW136703147 BCX0\">\u00a0<\/span><br \/><\/span><span class=\"TextRun SCXW136703147 BCX0\"><span class=\"NormalTextRun SCXW136703147 BCX0\"><strong>Fidelis NDR<\/strong> uses patented <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/network-security\/deep-session-inspection\/\">Deep Session Inspection<\/a>\u00ae to inspect all traffic\u2014across ports, protocols, SSL\/TLS\u2014and extract rich metadata like file activity, credentials, or decoy interaction.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW136703147 BCX0\"><span class=\"SCXW136703147 BCX0\">\u00a0<\/span><br \/><\/span><span class=\"TextRun SCXW136703147 BCX0\"><span class=\"NormalTextRun SCXW136703147 BCX0\"><strong>For example<\/strong>, a covert file transfer between asset groups triggers DSI\u2014even if the <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW136703147 BCX0\">session\u2019s<\/span><span class=\"NormalTextRun SCXW136703147 BCX0\"> encrypted. You gain asset risk intelligence and detection capability in a single sweep, dramatically shrinking blind spots.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-55a37493 e-con-full e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-c5799e5 e-con-full e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-12403d6 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-heading-title elementor-size-default\">Fidelis DSI &#8211; Advanced Data inspection and Threat Detection Capabilities<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-998e9b6 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Content Inspection<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Content Identification<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Full Session Reassembly<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Protocol and Application Decoding<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-21d3ad86 elementor-widget elementor-widget-button\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/fidelissecurity.com\/resource\/datasheet\/deep-session-inspection\/\"><br \/>\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\"><br \/>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download the Datasheet<\/span><br \/>\n\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-57742e04 e-con-full elementor-hidden-tablet elementor-hidden-mobile e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-1e79f2cd elementor-widget elementor-widget-image\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-39c2e81 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Automated terrain mapping elevates high-risk assets<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b719c8b elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW7695319 BCX0\"><span class=\"NormalTextRun SCXW7695319 BCX0\"><strong>Problem:<\/strong> Asset sprawl leads to hidden critical systems.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW7695319 BCX0\"><span class=\"SCXW7695319 BCX0\">\u00a0<\/span><br \/><\/span><span class=\"TextRun SCXW7695319 BCX0\"><span class=\"NormalTextRun SCXW7695319 BCX0\"><strong>Fidelis<\/strong> automatically discovers and classifies every asset\u2014<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW7695319 BCX0\">legacy<\/span><span class=\"NormalTextRun SCXW7695319 BCX0\"> servers, IoT devices, and cloud instances\u2014while generating a risk score by <\/span><span class=\"NormalTextRun SCXW7695319 BCX0\">identifying<\/span><span class=\"NormalTextRun SCXW7695319 BCX0\"> active <a href=\"https:\/\/fidelissecurity.com\/vulnerabilities\/\">vulnerabilities<\/a> and network exposure\u202f.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW7695319 BCX0\"><span class=\"SCXW7695319 BCX0\">\u00a0<\/span><br \/><\/span><span class=\"TextRun SCXW7695319 BCX0\"><span class=\"NormalTextRun SCXW7695319 BCX0\">If a new VPN-connected workstation <\/span><span class=\"NormalTextRun SCXW7695319 BCX0\">exhibits<\/span><span class=\"NormalTextRun SCXW7695319 BCX0\"> unpatched services, <\/span><span class=\"NormalTextRun SCXW7695319 BCX0\">it\u2019s<\/span><span class=\"NormalTextRun SCXW7695319 BCX0\"> flagged\u2014and prioritized, enabling risk-based asset security from day zero.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8469741 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Behavioral analytics support proactive network threat detection<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-3e18781 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW25234171 BCX0\"><span class=\"NormalTextRun SCXW25234171 BCX0\"><strong>Problem:<\/strong> Unknown threats fly under the radar.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW25234171 BCX0\"><span class=\"SCXW25234171 BCX0\">\u00a0<\/span><br \/><\/span><span class=\"TextRun SCXW25234171 BCX0\"><span class=\"NormalTextRun SCXW25234171 BCX0\"><strong>Fidelis NDR<\/strong> applies multiple machine learning models\u2014across external, internal, application protocols, and data movement contexts\u2014to <\/span><span class=\"NormalTextRun SCXW25234171 BCX0\"><a href=\"https:\/\/fidelissecurity.com\/cybersecurity-101\/learn\/anomaly-detection\/\">identify<\/a><\/span><span class=\"NormalTextRun SCXW25234171 BCX0\"><a href=\"https:\/\/fidelissecurity.com\/cybersecurity-101\/learn\/anomaly-detection\/\"> anomalies<\/a> such as unusual login patterns or lateral movement.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW25234171 BCX0\"><span class=\"SCXW25234171 BCX0\">\u00a0<\/span><br \/><\/span><span class=\"TextRun SCXW25234171 BCX0\"><span class=\"NormalTextRun SCXW25234171 BCX0\">For instance, spiking connections from a legacy server to multiple internal endpoints late at night triggers alerts tied to MITRE TTP for lateral movement\u2014empowering threat hunting with NDR backed by behavioral context.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d861dec elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Retrospective analysis empowers threat hunting<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0e1c89d elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW80115998 BCX0\"><span class=\"NormalTextRun SCXW80115998 BCX0\"><strong>Problem:<\/strong> Fast threats evade real-time detection.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW80115998 BCX0\"><span class=\"SCXW80115998 BCX0\">\u00a0<\/span><br \/><\/span><span class=\"TextRun SCXW80115998 BCX0\"><span class=\"NormalTextRun SCXW80115998 BCX0\"><strong>Fidelis<\/strong> stores <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/network-security\/context-rich-metadata\/\">rich metadata<\/a> from each session and retroactively applies new threat intelligence or signatures\u202f.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW80115998 BCX0\"><span class=\"SCXW80115998 BCX0\">\u00a0<\/span><br \/><\/span><span class=\"TextRun SCXW80115998 BCX0\"><span class=\"NormalTextRun SCXW80115998 BCX0\">That means if a new exploit is discovered, you can run historic asset <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW80115998 BCX0\">traffic for<\/span><span class=\"NormalTextRun SCXW80115998 BCX0\"> matches\u2014even without prior alerts. It exposes stealth attacks and deepens asset risk monitoring over time.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9de3b49 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Automated response controls protects at pace<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2eb4f17 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW165350889 BCX0\"><span class=\"NormalTextRun SCXW165350889 BCX0\"><strong>Problem:<\/strong> Manual workflows delay response and increase risk.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW165350889 BCX0\"><span class=\"SCXW165350889 BCX0\">\u00a0<\/span><br \/><\/span><span class=\"TextRun SCXW165350889 BCX0\"><span class=\"NormalTextRun SCXW165350889 BCX0\"><strong>Fidelis NDR<\/strong> supports inline or out-of-band blocking, <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/threat-detection-response\/sandbox-analysis-for-malware-detection\/\">sandbox-based threat analysis<\/a>, <a href=\"https:\/\/fidelissecurity.com\/solutions\/network-dlp\/\">network DLP<\/a>, and integration with endpoint isolation through Elevate playbooks.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW165350889 BCX0\"><span class=\"SCXW165350889 BCX0\">\u00a0<\/span><br \/><\/span><span class=\"TextRun SCXW165350889 BCX0\"><span class=\"NormalTextRun SCXW165350889 BCX0\"><strong>For example,<\/strong> if data exfiltration is detected, the system can automatically drop the session, quarantine the host, block specific asset communications, and open a <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW165350889 BCX0\">high\u00a0<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW165350889 BCX0\">priority<\/span><span class=\"NormalTextRun SCXW165350889 BCX0\"> ticket\u2014all in real time.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9eac1c5 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-5b1031d elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">What real-world benefits do security teams gain?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-80973d9 elementor-widget elementor-widget-eael-feature-list\">\n<div class=\"elementor-widget-container\">\n<div class=\"-icon-position-left -tablet-icon-position-left -mobile-icon-position-left\">\n<div class=\"eael-feature-list-icon-box\">\n<div class=\"eael-feature-list-icon-inner\">\n<p>\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-0\"><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"eael-feature-list-content-box\">\n<h3 class=\"eael-feature-list-title\">Accelerated threat detection and reduced dwell time<\/h3>\n<p class=\"eael-feature-list-content\">With full visibility and behavior-based detection, Fidelis NDR helps organizations identify and respond to threats up to nine times faster than competitors. That speed dramatically <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/xdr-security\/reduce-dwell-time-with-xdr\/\">reduces dwell time<\/a> and the risk of data exfiltration from high risk assets.<\/p>\n<\/div>\n<div class=\"eael-feature-list-icon-box\">\n<div class=\"eael-feature-list-icon-inner\">\n<p>\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-1\"><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"eael-feature-list-content-box\">\n<h3 class=\"eael-feature-list-title\">Reduced alert fatigue through risk-based prioritization<\/h3>\n<p class=\"eael-feature-list-content\">Alerts tied to critical assets or unusual behavior attract immediate attention, while noise from benign systems is silenced. Analysts focus on what threatens business continuity, improving efficiency and decision confidence.<\/p>\n<\/div>\n<div class=\"eael-feature-list-icon-box\">\n<div class=\"eael-feature-list-icon-inner\">\n<p>\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-2\"><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"eael-feature-list-content-box\">\n<h3 class=\"eael-feature-list-title\">Broader coverage across hybrid architectures<\/h3>\n<p class=\"eael-feature-list-content\">Sensors deploy on-prem, in cloud, and across email or web proxies\u2014covering traditional and modern environments. The result: proactive asset protection wherever data flows, not just on the perimeter.<\/p>\n<\/div>\n<div class=\"eael-feature-list-icon-box\">\n<div class=\"eael-feature-list-icon-inner\">\n<p>\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-3\"><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"eael-feature-list-content-box\">\n<h3 class=\"eael-feature-list-title\">Elevated threat hunting and forensic analysis<\/h3>\n<p class=\"eael-feature-list-content\">With retrospective search across stored <a href=\"https:\/\/fidelissecurity.com\/cybersecurity-101\/learn\/network-metadata-importance\/\">metadata<\/a>, your team can hunt for artifacts tied to new CVEs or IOC feeds, even weeks later. Asset risk monitoring becomes forensic-grade, not just reactive.<\/p>\n<\/div>\n<div class=\"eael-feature-list-icon-box\">\n<div class=\"eael-feature-list-icon-inner\">\n<p>\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-4\"><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"eael-feature-list-content-box\">\n<h3 class=\"eael-feature-list-title\">Playbook-driven incident response streamlines operations<\/h3>\n<p class=\"eael-feature-list-content\">Prebuilt workflows reduce response latency\u2014block connections, contain endpoints, alert stakeholders, and log tickets automatically. This orchestration empowers smaller teams to respond at scale.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-36663cc e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-ad13d36 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">What should your organization do next?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-55ab2f9 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<span>Deploy Fidelis NDR sensors<\/span><span> across network chokepoints\u2014cloud gateways, East-West segments, and perimeter links\u2014to begin full-session capture.<\/span><span>Enable Deep Session Inspection and behavioral analytics<\/span><span>, tuning model thresholds to align with your business environment.<\/span><span>Activate asset discovery and risk scoring<\/span><span>, integrating <a href=\"https:\/\/fidelissecurity.com\/cybersecurity-101\/learn\/what-is-vulnerability-scanning\/\">vulnerability scan<\/a> feeds for context-aware prioritization.<\/span><span>Configure automated response policies<\/span><span>: asset quarantine, session blocking, endpoint integration via Elevate.<\/span><span>Run retrospective hunts<\/span><span> using <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/threat-intelligence\/what-is-cyber-threat-intelligence\/\">threat intelligence<\/a> updates to evaluate past asset behaviour and fine-tune detection.<\/span><span>Evaluate performance quarterly<\/span><span>, benchmarking detection timelines, containment success, and asset risk reduction metrics.<\/span><span>\u00a0<\/span>\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4bc9f809 e-con-full post-cta-section e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-673cf09c elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-heading-title elementor-size-default\">Give Us 10 Minutes \u2013 We\u2019ll Show You the Future of Security<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-34557731 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><em><span class=\"TextRun SCXW162222109 BCX8\"><span class=\"NormalTextRun SCXW162222109 BCX8\">See why security teams trust Fidelis to:<\/span><\/span><\/em><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-383d6c81 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cut threat detection time by 9x<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Simplify security operations<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Provide unmatched visibility and control<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ce496bc elementor-widget elementor-widget-button\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/fidelissecurity.com\/get-a-demo\/\"><br \/>\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\"><br \/>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Book a Demo Now!<\/span><br \/>\n\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-75c47b1 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-725556a elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Final thoughts<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d95ff7b elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Shifting from reactive firefighting to proactive asset protection is essential in today\u2019s threat landscape. Traditional asset security tactics lack speed and context. By leveraging risk based vulnerability management, behavioral anomaly detection, and real-time asset detection and response, <a href=\"https:\/\/fidelissecurity.com\/solutions\/network-detection-and-response-ndr\/\">Fidelis NDR<\/a> fills the gap.\u00a0<\/p>\n<p>Fidelis Network Detect and Response( NDR ) offers full visibility, rich metadata collection, automated asset risk scoring, forensic-grade retrospective analysis, and real-time orchestration\u2014all designed to empower security teams to detect, protect, and most importantly, respond before breaches take hold.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>The post <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/network-security\/risk-based-asset-protection\/\">How does Fidelis NDR Delivers Proactive Asset Risk Mitigation?<\/a> appeared first on <a href=\"https:\/\/fidelissecurity.com\/\">Fidelis Security<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Organizations operating in sprawling, hybrid IT environments often lack complete visibility into all assets and their communication patterns. This gap creates blind spots where vulnerabilities go undetected, third-party\u00a0components remain unpatched, and unauthorized lateral movement can occur without raising alarms.\u00a0When unknown assets slip through discovery processes, attackers exploit them quietly\u2014probing for weaknesses, injecting malicious payloads, and [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":4018,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-4017","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/4017"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4017"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/4017\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/4018"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4017"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4017"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}