{"id":111024,"date":"2025-04-25T17:29:59","date_gmt":"2025-04-25T09:29:59","guid":{"rendered":"https:\/\/version-2.com\/?p=111024"},"modified":"2025-04-24T17:40:50","modified_gmt":"2025-04-24T09:40:50","slug":"eset-world-2025-staying-protected-with-mdr","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2025\/04\/eset-world-2025-staying-protected-with-mdr\/","title":{"rendered":"ESET World 2025: Staying protected with MDR"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"111024\" class=\"elementor elementor-111024\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><div class=\"image-wrapper\"><img fetchpriority=\"high\" decoding=\"async\" class=\"rimg in-text-left hidden-to-sm\" src=\"https:\/\/v2catalog.com\/wp-content\/uploads\/2025\/04\/Protected_with_MDR_thumb.png\" alt=\"\" width=\"250\" height=\"250\" \/><\/div><div class=\"meta\"><span class=\"author\">M\u00e1rk Szab\u00f3<\/span><time class=\"date hidden-to-sm\">17 Apr 2025<\/time><\/div><div id=\"content-c11640379\" class=\"frame frame-default frame-type-text frame-layout-0\"><p><em>Discover what round-the-clock security means with James Rodewald, as he explains what makes ESET MDR the security service to get.<\/em><\/p><p><strong><a href=\"https:\/\/esetworld.com\/\" target=\"_blank\" rel=\"noopener\">ESET World 2025<\/a><\/strong> was an event that brought together top cybersecurity experts from all walks of life, so you\u2019d expect tangible examples of what makes a business really stay secure. That\u2019s exactly what James Rodewald, security monitoring analyst at ESET did.<\/p><p>During the session titled \u201cStaying protected with ESET MDR,\u201d Rodewald pointed out the critical pain points of IT admins and how managed detection and response (MDR) saves them time and unlocks new efficiencies, as well as sharing a story about a VPN gone rogue.<\/p><\/div><div id=\"content-c11640380\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Day in the life of an IT admin<\/h3><\/header><p>Usually, IT admins need to split their focus between many areas, and security is just another small part of their tasks, often getting less attention than necessary.<\/p><p>Of the many issues surrounding a company\u2019s cybersecurity, their <strong>budgets<\/strong> are a key concern \u2014 proper security operations centers (SOCs) can be pricy, as covering hundreds of seats takes <strong>time<\/strong> and effort. Some companies assume that having two people cover an entire SOC\u2019s capabilities is enough though, but Rodewald strongly disagrees: \u201cThey wouldn\u2019t be able to monitor 24\/7. \u2026 If something happens while they\u2019re asleep or possibly on vacation, that could be really bad.\u201d<\/p><\/div><div id=\"content-c11640381\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img decoding=\"async\" src=\"https:\/\/v2catalog.com\/wp-content\/uploads\/2025\/04\/IT_admin_pain_points.png\" alt=\"\" width=\"604\" height=\"328\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11640382\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>While Rodewald doesn\u2019t want to deter IT professionals from trying, he highlights that there are certain gaps that only security experts can fill: \u201cIT admins are smart. They\u2019re great at what they do. They make these beautiful systems that all communicate with each other \u2014 and that\u2019s amazing. But sometimes they don\u2019t <strong>know how<\/strong> to notice when somebody else is maliciously managing their network. And that\u2019s where the dangers come in.\u201d<\/p><\/div><div id=\"content-c11640383\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">ESET MDR to the rescue!<\/h3><\/header><p>Securing added resources for IT admins to fight threats while they take care of daily tasks is what <a href=\"https:\/\/www.eset.com\/us\/business\/services\/managed-detection-and-response\/\" target=\"_blank\" rel=\"noopener\">ESET MDR<\/a> offers in spades. This is rather helpful for smaller businesses lacking security headcount within their IT departments, quickly leveling up their postures. \u201cIt\u2019s like you set it and forget it. \u2026 Customers want somebody to monitor and <em>be notified<\/em> if something happened, what we did to remediate it, are there any actions they need to take,\u201d said Rodewald about the service.<\/p><p class=\"alert\">ESET MDR is a <a href=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/Docs\/Business\/ESET_MDR_datasheet_WEB.pdf\" target=\"_blank\" rel=\"noopener\">24\/7 threat management service<\/a> for smaller organizations, using AI and human expertise for premium protection without in-house security specialists. Let ESET block, stop, and disrupt malicious behavior in just 20 minutes while you focus on core competencies.<\/p><p>While a basic MDR service can offer enterprise-grade security, with monitoring performed by earnest experts trained to stop security incidents (using top threat intelligence to empower their decisions), a lot more can be done for complex environments with a larger footprint. These environments need a specific approach, slotting in naturally to the existing security apparatus of a larger organization.<\/p><\/div><div id=\"content-c11640384\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img decoding=\"async\" src=\"https:\/\/v2catalog.com\/wp-content\/uploads\/2025\/04\/ESET_MDR_services.png\" alt=\"\" width=\"604\" height=\"302\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11640385\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>As Rodewald said, <a href=\"https:\/\/www.eset.com\/us\/business\/mdr-ultimate-protection\/\" target=\"_blank\" rel=\"noopener\">ESET MDR Ultimate<\/a> (MDRU) is \u201cfor those customers that want to <em>live with us<\/em> in real time as we monitor their environment \u2026 benefits range from custom rule and alert creation, [to] optimizing the security environment &#8230; to finding unprotected devices, etc. So, across the range of these activities, we drive both operational and process maturity, help with remediation, and even flag those unprotected devices, sadly an all-too-common source of threats.\u201d<\/p><p class=\"alert\"><a href=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/Docs\/Business\/ESET_Detection___Response_Ultimate_datasheet_WEB_noContact.pdf\" target=\"_blank\" rel=\"noopener\">ESET MDRU<\/a> perfectly combines ESET technology and digital security expertise to effectively and proactively detect and respond to any threat. It is a tailored service, acting as a SOC-like security umbrella, with the ability to protect sophisticated environments with dedicated security teams.<\/p><p>Rodewald also highlighted ESET MDRU\u2019s reports, explaining how the process is more human, connecting experts from both sides to design better protection rules and mechanisms in tandem, which adds even more value.<\/p><\/div><div id=\"content-c11640386\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Maintaining 20 minutes to detect<\/h3><\/header><p>The ESET MDR service tier maintains a <strong><em><a href=\"https:\/\/www.eset.com\/us\/business\/services\/managed-detection-and-response\/?srsltid=AfmBOoo6Cg_KeP5O0yXYOvNe5OiI41nhff8e8qEwq0IZE9w3Ko3H3fBT\" target=\"_blank\" rel=\"noopener\">20-minute time to detect<\/a><\/em><\/strong> for all customers \u2014 currently having a <strong>1-minute time to react<\/strong> and around a <strong>5-minute time to resolve<\/strong> an incident. This is owed to 24\/7 SOC-like monitoring, with our MDR teams constantly improving their decision-making processes with every single detection.<\/p><\/div><div id=\"content-c11640387\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/v2catalog.com\/wp-content\/uploads\/2025\/04\/MDR_detection_time.png\" alt=\"\" width=\"800\" height=\"333\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11640388\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>To achieve this fast detection and response rate, Rodewald elaborated on ESET MDR\u2019s training regime: \u201cThe way we train is to ask the question, could we have spotted this sooner? Because if we can improve, then we want to improve. Also, would you be able to identify this [threat] if you saw it in the wild?\u201d Relevant teams also examine research so they might better identify issues they hadn\u2019t yet encountered.<\/p><p>As a result, ESET\u2019s MDR teams can actively isolate false positives from real detections, apply novel incident response playbooks as needed, and manage trainings to keep analysts up to date on threats. For in-house teams (especially IT generalists), this might be a tough nut to crack, but it\u2019s the vicious cycle that ESET security monitoring analysts are trained for.<\/p><\/div><div id=\"content-c11640389\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Storytime with James<\/h3><\/header><p>In a story about an ESET MDRU success, Rodewald spoke of how a VPN gone rogue led to <a href=\"https:\/\/krebsonsecurity.com\/2024\/07\/the-stark-truth-behind-the-resurgence-of-russias-fin7\/\" target=\"_blank\" rel=\"noopener\">FIN7<\/a> getting on a business\u2019s network. The company in question, which owns a large network with multiple sites globally, was unknowingly breached prior to onboarding its ESET service (at least two to three months before). While it had an XDR solution employed, no one was monitoring it \u2014 a recipe for disaster.<\/p><\/div><div id=\"content-c11640390\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h4 class=\"bold\">Before the storm<\/h4><\/header><p>In the beginning, someone had used PowerShell to create an external network connection, leading to a renamed remote monitoring and management (RMM) tool being installed (<em>LiteManager<\/em>). The PowerShell also had an interesting script called \u201c<a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/ps1.powertrash\" target=\"_blank\" rel=\"noopener\">PowerTrash<\/a>,\u201d which was over 6,000 lines long.<\/p><\/div><div id=\"content-c11640391\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/v2catalog.com\/wp-content\/uploads\/2025\/04\/PowerTrash_image_1.png\" alt=\"\" width=\"800\" height=\"417\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11640392\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>Next, the RMM tool, renamed to <em>romfusclient.exe<\/em>, started another execution chain to install an <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/Secure-Shell\" target=\"_blank\" rel=\"noopener\">OpenSSH<\/a> backdoor: \u201cThis backdoor would communicate with a remote C&amp;C [command-and-control] server and allow whoever was in control to tunnel through this device to target other devices on the network,\u201d said Rodewald.<\/p><\/div><div id=\"content-c11640393\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/v2catalog.com\/wp-content\/uploads\/2025\/04\/RMM_tool_executed.png\" alt=\"\" width=\"800\" height=\"462\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11640394\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h4 class=\"bold\">How ESET MDRU helped<\/h4><\/header><p>Shortly after ESET MDRU\u2019s onboarding, monitoring picked up on lateral movement via remotely scheduled tasks \u2014 another instance of PowerTrash was being executed: \u201cIts goal was to dump credentials and load <em>Spy.Sekur<\/em> into memory. At this point, we knew it was FIN7 because <a href=\"https:\/\/www.deepwatch.com\/labs\/profile-of-an-adversary-fin7\/\" target=\"_blank\" rel=\"noopener\"><em>Spy.Sekur<\/em> is only used by FIN7<\/a>, and PowerTrash, I believe, is also exclusive to FIN7,\u201d commented Rodewald. The latter was 41,000 lines of code, much longer than the previous instance.<\/p><\/div><div id=\"content-c11640395\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/v2catalog.com\/wp-content\/uploads\/2025\/04\/PowerTrash_image_2.png\" alt=\"\" width=\"800\" height=\"466\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11640396\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>\u201cWe started to see other lateral movement as we were creating custom rules to block things. \u2026 And we started to see this via both remote tasks and <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/winrm\/portal\" target=\"_blank\" rel=\"noopener\">WinRM<\/a>. We saw that their goal this time was to execute a batch file to execute a renamed version of RClone.exe in order to back up the file shares of the network and then use a renamed copy of 7-Zip to compress that all before they would then exfiltrate it,\u201d Rodewald continued.<\/p><\/div><div id=\"content-c11640397\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/v2catalog.com\/wp-content\/uploads\/2025\/04\/rclone_and_lateral_movement.png\" alt=\"\" width=\"800\" height=\"437\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11640398\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h4 class=\"bold\">Killing and blocking<\/h4><\/header><p>The MDR team then started to kill and block these processes while creating custom rules to disable them permanently. Nevertheless, this was happening across multiple devices, with multiple forms of lateral movement.<\/p><p>Since the MDR team had the source IPs of each of those movements, it understood that it had to locate unprotected devices in the customer\u2019s environment because they weren\u2019t showing up inside ESET PROTECT or ESET Inspect as being managed. \u201cSo, we\u2019re on the phone at this point, and I\u2019m having them remote me directly into these devices so I can see what\u2019s going on. We found OpenSSH backdoors on multiple different devices \u2014 we needed to either have the client cut them off the network, or I needed to manually remediate the[m],\u201d said Rodewald.<\/p><\/div><div id=\"content-c11640399\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/v2catalog.com\/wp-content\/uploads\/2025\/04\/WinRM_unprotected_devices.png\" alt=\"\" width=\"800\" height=\"432\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11640400\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>However, the adversary wasn\u2019t done. Likely panicking as they were losing access, they dropped a new tool: \u201cIt was a never-before-seen <a href=\"https:\/\/attack.mitre.org\/techniques\/T1574\/002\/\" target=\"_blank\" rel=\"noopener\">DLL side-load<\/a>!\u201d exclaimed Rodewald. While the .exe may have been seen in the wild before (TopoEdit) it included a malicious DLL.<\/p><\/div><div id=\"content-c11640401\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/v2catalog.com\/wp-content\/uploads\/2025\/04\/DLL_sideload.png\" alt=\"\" width=\"800\" height=\"431\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11640402\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>\u201cThey were trying to stay on the network. \u2026 <em>We spotted that in less than 30 seconds<\/em>,\u201d said Rodewald with a smile. Thus, the MDR team blocked the clean <em>.exe<\/em> and the DLL and remediated it from about six or seven other devices, all within the same time frame.<\/p><\/div><div id=\"content-c11640403\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h4 class=\"bold\">Back to the origin<\/h4><\/header><p>In parallel, the team became curious to investigate how initial access occurred: \u201cWe started pulling logs from devices, trying to find the trail of events \u2026 so we were doing digital forensic [incident] investigation.\u201d Before they got too deep into that investigation, the threat actors showed their cards: Someone was using <a href=\"https:\/\/www.welivesecurity.com\/2022\/09\/07\/rdp-radar-up-close-view-evolving-remote-access-threats\/\" target=\"_blank\" rel=\"noopener\">Remote Desktop Protocol (RDP) from private IPs<\/a> to access different devices and immediately installing <em>AteraAgent<\/em> with <em>Splashtop<\/em> \u2014 two other RMM tools.<\/p><p>However, these IPs were on a specific subnet that was different from other devices on the network, which were quickly confirmed by the business\u2019 admin as addresses assigned by the client\u2019s VPN.<\/p><\/div><div id=\"content-c11640404\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/v2catalog.com\/wp-content\/uploads\/2025\/04\/VPN_gone_rogue.png\" alt=\"\" width=\"800\" height=\"436\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11640405\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>\u201cTheir<a href=\"https:\/\/www.welivesecurity.com\/en\/business-security\/vulnerabilities-business-vpns-spotlight\/\" target=\"_blank\" rel=\"noopener\"> VPN appliance was compromised<\/a>. They had rogue devices owned by the threat actor joining the VPN and then RDPing to other devices,\u201d Rodewald revealed. Hence, the MDR team had the company shut down its VPN, with no new activity since, though it is still being monitored.<\/p><p>This story highlights how thanks to the close-knit cooperation enabled by the ESET MDRU service, immediate action was taken, quickly developing new playbooks and security strategies for the client to prevent future incidents.<\/p><\/div><div id=\"content-c11640406\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Prevention-first security<\/h3><\/header><p>The key value of ESET\u2019s MDR services lies in its <a href=\"https:\/\/www.eset.com\/us\/business\/prevention-first-approach\/\" target=\"_blank\" rel=\"noopener\">prevention-first quality<\/a>. With each of ESET\u2019s managed services tackling different company architectures, the goal is the same \u2014 unlocking fast detection and almost immediate remediation, tackling novel threats before they can cause mischief.<\/p><p>Plus, as evidenced by Rodewald\u2019s rogue VPN story, perhaps going for a managed service even while experiencing a compromise can enable businesses to snatch a security win from the creeping tentacles of a breach.<\/p><\/div><div id=\"content-c11640407\" class=\"frame frame-default frame-type-html frame-layout-0\">\u00a0<\/div><\/div><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>M\u00e1rk Szab\u00f317 Apr 2025 Discover what round-the-clock sec [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1305,40,61],"tags":[1077,41],"class_list":["post-111024","post","type-post","status-publish","format-standard","hentry","category-1305","category-eset","category-press-release","tag-1077","tag-eset"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ESET World 2025: Staying protected with MDR - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/enterprise\/eset-world-2025-staying-protected-with-mdr-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ESET World 2025: Staying protected with MDR - Version 2\" \/>\n<meta property=\"og:description\" content=\"M\u00e1rk Szab\u00f317 Apr 2025 Discover what round-the-clock sec [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/enterprise\/eset-world-2025-staying-protected-with-mdr-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-25T09:29:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/v2catalog.com\/wp-content\/uploads\/2025\/04\/Protected_with_MDR_thumb.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/eset-world-2025-staying-protected-with-mdr-1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/04\\\/eset-world-2025-staying-protected-with-mdr\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"ESET World 2025: Staying protected with MDR\",\"datePublished\":\"2025-04-25T09:29:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/04\\\/eset-world-2025-staying-protected-with-mdr\\\/\"},\"wordCount\":1640,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/eset-world-2025-staying-protected-with-mdr-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/v2catalog.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Protected_with_MDR_thumb.png\",\"keywords\":[\"2025\",\"ESET\"],\"articleSection\":[\"2025\",\"ESET\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/eset-world-2025-staying-protected-with-mdr-1\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/04\\\/eset-world-2025-staying-protected-with-mdr\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/eset-world-2025-staying-protected-with-mdr-1\\\/\",\"name\":\"ESET World 2025: Staying protected with MDR - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/eset-world-2025-staying-protected-with-mdr-1\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/eset-world-2025-staying-protected-with-mdr-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/v2catalog.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Protected_with_MDR_thumb.png\",\"datePublished\":\"2025-04-25T09:29:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/eset-world-2025-staying-protected-with-mdr-1\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/eset-world-2025-staying-protected-with-mdr-1\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/eset-world-2025-staying-protected-with-mdr-1\\\/#primaryimage\",\"url\":\"https:\\\/\\\/v2catalog.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Protected_with_MDR_thumb.png\",\"contentUrl\":\"https:\\\/\\\/v2catalog.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Protected_with_MDR_thumb.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/eset-world-2025-staying-protected-with-mdr-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ESET World 2025: Staying protected with MDR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ESET World 2025: Staying protected with MDR - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/enterprise\/eset-world-2025-staying-protected-with-mdr-1\/","og_locale":"en_US","og_type":"article","og_title":"ESET World 2025: Staying protected with MDR - Version 2","og_description":"M\u00e1rk Szab\u00f317 Apr 2025 Discover what round-the-clock sec [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/enterprise\/eset-world-2025-staying-protected-with-mdr-1\/","og_site_name":"Version 2","article_published_time":"2025-04-25T09:29:59+00:00","og_image":[{"url":"https:\/\/v2catalog.com\/wp-content\/uploads\/2025\/04\/Protected_with_MDR_thumb.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/enterprise\/eset-world-2025-staying-protected-with-mdr-1\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/04\/eset-world-2025-staying-protected-with-mdr\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"ESET World 2025: Staying protected with MDR","datePublished":"2025-04-25T09:29:59+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/04\/eset-world-2025-staying-protected-with-mdr\/"},"wordCount":1640,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.eset.com\/blog\/enterprise\/eset-world-2025-staying-protected-with-mdr-1\/#primaryimage"},"thumbnailUrl":"https:\/\/v2catalog.com\/wp-content\/uploads\/2025\/04\/Protected_with_MDR_thumb.png","keywords":["2025","ESET"],"articleSection":["2025","ESET","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/enterprise\/eset-world-2025-staying-protected-with-mdr-1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/04\/eset-world-2025-staying-protected-with-mdr\/","url":"https:\/\/www.eset.com\/blog\/enterprise\/eset-world-2025-staying-protected-with-mdr-1\/","name":"ESET World 2025: Staying protected with MDR - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eset.com\/blog\/enterprise\/eset-world-2025-staying-protected-with-mdr-1\/#primaryimage"},"image":{"@id":"https:\/\/www.eset.com\/blog\/enterprise\/eset-world-2025-staying-protected-with-mdr-1\/#primaryimage"},"thumbnailUrl":"https:\/\/v2catalog.com\/wp-content\/uploads\/2025\/04\/Protected_with_MDR_thumb.png","datePublished":"2025-04-25T09:29:59+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/enterprise\/eset-world-2025-staying-protected-with-mdr-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/enterprise\/eset-world-2025-staying-protected-with-mdr-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eset.com\/blog\/enterprise\/eset-world-2025-staying-protected-with-mdr-1\/#primaryimage","url":"https:\/\/v2catalog.com\/wp-content\/uploads\/2025\/04\/Protected_with_MDR_thumb.png","contentUrl":"https:\/\/v2catalog.com\/wp-content\/uploads\/2025\/04\/Protected_with_MDR_thumb.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/enterprise\/eset-world-2025-staying-protected-with-mdr-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"ESET World 2025: Staying protected with MDR"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-sSI","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/111024","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=111024"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/111024\/revisions"}],"predecessor-version":[{"id":111028,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/111024\/revisions\/111028"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=111024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=111024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=111024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}