{"id":78134,"date":"2024-05-07T17:31:51","date_gmt":"2024-05-07T09:31:51","guid":{"rendered":"https:\/\/version-2.com\/?p=78134"},"modified":"2024-05-02T17:34:38","modified_gmt":"2024-05-02T09:34:38","slug":"leveling-the-playing-field-for-all-with-mdr","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/05\/leveling-the-playing-field-for-all-with-mdr\/","title":{"rendered":"Leveling the playing field for all with MDR"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"78134\" class=\"elementor elementor-78134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><div><div id=\"content-c10567462\" class=\"frame frame-default frame-type-text frame-layout-0\"><p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/mdr-launch-crb-thumb-250x250.png\" alt=\"\" width=\"250\" height=\"250\" \/><\/p><div><div id=\"content-c10547611\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>One thing that every company, from the smallest business to the largest enterprise, has in common is that all of them face a world of evolving threats that periodically come knocking on their doorsteps.\u00a0<\/p><p>To counter these threats early on, <a href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/resources\/eset_smb_digital_security_sentiment_report.pdf\" target=\"_blank\" rel=\"noopener\">small and medium-sized businesses (SMBs) are looking<\/a> to spice up their security postures, while enterprises find that they need to cover operations beyond what their security operations centers (SOCs) are able to address themselves. All of this can be alleviated via detection and response, which can work wonders to heighten the security status of any organization willing to utilize it comprehensively.<\/p><p>However, certain skills are required to realize the benefits while also keeping challenges in check. Putting budget aside for the moment, the <a href=\"https:\/\/www.csoonline.com\/article\/657598\/cybersecurity-workforce-shortage-reaches-4-million-despite-significant-recruitment-drive.html\" target=\"_blank\" rel=\"noopener\">skilled professionals needed<\/a> to operate detection and response platforms successfully are hard to come by these days.<\/p><p>So why not employ professionals who know how to manage detection and response without having to allocate extensive resources for further hiring?<\/p><p>What we are talking about is <a href=\"https:\/\/www.welivesecurity.com\/2023\/03\/23\/understanding-managed-detection-response-what-look-mdr-solution\/\" target=\"_blank\" rel=\"noopener\">Managed Detection and Response<\/a> (MDR), which can address threats proactively, deliberately, and indeed, very quickly. Furthermore, management of these capabilities helps immediately address the most demanding aspects of both, deploying and deriving benefits from what can be a complex set of tools and processes.<\/p><\/div><div id=\"content-c10547612\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Detection<\/h3><\/header><p>One of the most important parts of proactive threat hunting is to have the ability to manage the attack surface just like a general would manage a battlefield \u2014 to know all the hazards, strategic points, numbers, and logistics.<\/p><p>While the scope and power of standard Endpoint Detection and Response (EDR) can serve the needs of businesses of a certain size and maturity, EDR\u2019s complexity may hamper a timely response. In some cases, even with both the AI-powered automation and human skill attributed to in-house SOCs, businesses might still lack the necessary in-depth understanding of a product or the threat landscape.<\/p><p>Approaching the many challenges around detection and response, even with the support of AI for capacity-intense processes like assessing entities and <a href=\"https:\/\/www.eset.com\/blog\/enterprise\/leveraging-automation-and-ux-to-reduce-admin-decision-fatigue-on-detection-and-response-platforms\/\" target=\"_blank\" rel=\"noopener\">correlation to incident<\/a> assessment, SOC teams have additional burdens. These include:<\/p><ul><li>Achieving <strong>compliance<\/strong> with industry regulations<\/li><li><strong>Meeting security needs<\/strong> with minimum impact on business processes while still minimizing incident response times<\/li><\/ul><p>Due to the numerosity and complexity of some of these burdens, opening a conversation about offloading portions of these responsibilities via MDR can bring into sharper focus which of these operations are mission-critical for your business.<\/p><\/div><div id=\"content-c10547613\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">And response<\/h3><\/header><p><a href=\"https:\/\/www.welivesecurity.com\/2021\/09\/14\/cyber-attack-surface-reduce\/\" target=\"_blank\" rel=\"noopener\">Shrinking the attack surface<\/a>, covering all endpoints, cloud-first AI-powered operation \u2014 while these phrases might sound like a bunch of technobabble from a futuristic movie, they all represent actual possibilities within cybersecurity that can be handled, in most cases, through detection and response solutions such as Extended Detection and Response (XDR).<\/p><p>While detection can work based on automatically created incidents and the many <a href=\"https:\/\/www.eset.com\/me\/business\/solutions\/xdr-extended-detection-and-response\/\" target=\"_blank\" rel=\"noopener\">rules in ESET Inspect<\/a>, leveraging its power for a more intense and rewarding security experience can only be done by working with people who have a close connection with the creators and developers of such detection and response solutions \u2014 connecting the telemetry and product into a single experience for the business that is wary of the threats it might face. With the identified set of detection responsibilities offloaded to managing detection processes, the SOC can focus its capacity on response.<\/p><p>Alternatively, response processes can benefit equally from external management, especially when the provider is intimately familiar with the product. The benefits are clear for SMBs that cannot or do not want to manage their own containment and remediation. Larger businesses may want their IT staff to maintain its focus on daily functioning in the knowledge that there is a safety net capable of protecting their business 24\/7\/365. This is the promise of MDR, and it can supply this in spades.<\/p><\/div><div id=\"content-c10547614\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Managing likely threats at every step and every level<\/h3><\/header><p>The difficulty of covering all attack surfaces via D&amp;R depends on a number of factors, including the security expertise a company possesses; its security environment; its budgetary constraints; and external factors such as a lack of potential security recruits, deliberate threat targeting, or even threats vectoring via a company\u2019s <a href=\"https:\/\/www.welivesecurity.com\/2021\/04\/07\/supply-chain-attacks-when-trust-goes-wrong-try-hope\/\" target=\"_blank\" rel=\"noopener\">supply chain<\/a>.<\/p><p>These days, it is not only organizations that see a rising need for better protection but also <a href=\"https:\/\/www.welivesecurity.com\/en\/business-security\/buck-stops-stakes-high-cisos\/\" target=\"_blank\" rel=\"noopener\">government regulators<\/a> and <a href=\"https:\/\/www.eset.com\/blog\/business\/how-to-decrease-security-liabilities-for-smbs-look-at-cyber-risks-through-the-eyes-of-an-insurer\/\" target=\"_blank\" rel=\"noopener\">cyber insurance companies<\/a>, who devise requirements to make businesses less complacent and more likely to invest in better security \u2014 since oftentimes, an attack on one business or its tool can have a cumulative effect, impacting its partners and customers. This is especially true with supply-chain attacks like <a href=\"https:\/\/www.techtarget.com\/whatis\/feature\/SolarWinds-hack-explained-Everything-you-need-to-know\" target=\"_blank\" rel=\"noopener\">SolarWinds<\/a> or <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/the-moveit-hack-and-what-it-taught-us-about-application-security\/\" target=\"_blank\" rel=\"noopener\">MOVEit<\/a>. A single weak point or an underestimation of security, and poof; you have not only a single incident but a whole slew of them impacting several different companies that use the same piece of software.<\/p><p>Protection needs to work on every level, for any business, be it small, midsize, or enterprise. But to do so, pre-emptive proactive threat hunting has to be employed first, which MDR can offer, serving as the first step of a multilayered security posture focused on taking care of threats before they transform into incidents.<\/p><\/div><div id=\"content-c10547615\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Which MDR?<\/h3><\/header><p>To ward off any threat, security vendors have to be able to protect against threats at every level, for any business or its verticals.<\/p><\/div><div id=\"content-c10547616\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h4 class=\"bold\">ESET PROTECT MDR<\/h4><\/header><p><strong><a href=\"https:\/\/www.eset.com\/int\/business\/mdr-protection\/\" target=\"_blank\" rel=\"noopener\">ESET PROTECT MDR<\/a><\/strong> provides a service that can help businesses of all sizes and maturity levels achieve a better security posture 24\/7\/365, powered by AI and human experts, ensuring enterprise-level protection, gaining security maturity that matches the size, scale, and scope of a business. With custom support aimed at providing comprehensive protection and a rapid response time of 20 minutes, closing cybersecurity gaps, including those created by external forces such as a lack of skilled hires, has never been easier.<\/p><p>As a bonus, ESET PROTECT MDR includes everything in ESET PROTECT Elite, the ESET MDR service, and ESET Premium Support Essential, creating a package that offers an elite security solution coupled with human support and expertise to complete one\u2019s security posture.<\/p><p>A great addition here is also the inclusion of scheduled reports, including advanced behavioral reports provided by <strong><a href=\"https:\/\/www.eset.com\/int\/business\/solutions\/advanced-threat-defense\/\" target=\"_blank\" rel=\"noopener\">ESET LiveGuard Advanced (ELGA)<\/a><\/strong>, our proactive cloud-based threat defense against targeted attacks and new, never-before-seen threat types, especially ransomware. With these reports, security admins will have a better visibility into what\u2019s happening within their systems, providing a complete overview of how ELGA analyzed a malicious sample.<\/p><\/div><div id=\"content-c10547617\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h4 class=\"bold\">ESET PROTECT MDR Ultimate<\/h4><\/header><p>And for the enterprises that don\u2019t want to leave any room for error, an MDR service can augment their existing security by giving additional breathing room to their SOCs, as policing a global operation takes tremendous resources that could be spent elsewhere.<\/p><p>And that\u2019s why adding MDR to the mix makes sense, as it both adds more expertise and enables an enterprise to enjoy superior cyber risk protection, with access to world-leading threat hunters whose job is to do exactly that \u2014 to know how to find and act against threats with a service tailor fit for the enterprise\u2019s whole operation.<\/p><p>All of this is present within <strong><a href=\"https:\/\/www.eset.com\/int\/business\/mdr-ultimate-protection\/\" target=\"_blank\" rel=\"noopener\">ESET PROTECT MDR Ultimate<\/a><\/strong>, a service that provides top-notch proactive prevention with superior cybersecurity protection, enabling granular visibility into a company\u2019s whole environment through a tailored security service, to stay one step ahead of all emerging threats. The Ultimate tier also includes remote digital forensic incident response assistance, which helps businesses by overseeing the collection and analysis of incident logs for a better understanding of how an incident happened and how future occurrences can be prevented.<\/p><\/div><div id=\"content-c10547618\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Cybersecurity \u2013 a top priority<\/h3><\/header><p>In today&#8217;s world, data breaches and security interruptions are not just possibilities, they are inevitable. Customers want partners that can assure them of sound security, and that is where our MDR services come in. We guarantee unparalleled security that can make all the difference between being a successful and an unsuccessful business.<br \/>To conclude, cybersecurity should never be taken for granted, it must be given the utmost importance to protect your business and customers from harm. So, focus on cybersecurity, and do it proactively so that threats never breach your doorstep.<\/p><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>One thing that every company, from the smallest busines [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,40,61],"tags":[41,1272],"class_list":["post-78134","post","type-post","status-publish","format-standard","hentry","category-1273","category-eset","category-press-release","tag-eset","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Leveling the playing field for all with MDR - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/new-products\/leveling-the-playing-field-for-all-with-mdr\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Leveling the playing field for all with MDR - Version 2\" \/>\n<meta property=\"og:description\" content=\"One thing that every company, from the smallest busines [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/new-products\/leveling-the-playing-field-for-all-with-mdr\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-07T09:31:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/mdr-launch-crb-thumb-250x250.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/leveling-the-playing-field-for-all-with-mdr\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/05\\\/leveling-the-playing-field-for-all-with-mdr\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Leveling the playing field for all with MDR\",\"datePublished\":\"2024-05-07T09:31:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/05\\\/leveling-the-playing-field-for-all-with-mdr\\\/\"},\"wordCount\":1358,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/leveling-the-playing-field-for-all-with-mdr\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/mdr-launch-crb-thumb-250x250.png\",\"keywords\":[\"ESET\",\"2024\"],\"articleSection\":[\"2024\",\"ESET\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/leveling-the-playing-field-for-all-with-mdr\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/05\\\/leveling-the-playing-field-for-all-with-mdr\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/leveling-the-playing-field-for-all-with-mdr\\\/\",\"name\":\"Leveling the playing field for all with MDR - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/leveling-the-playing-field-for-all-with-mdr\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/leveling-the-playing-field-for-all-with-mdr\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/mdr-launch-crb-thumb-250x250.png\",\"datePublished\":\"2024-05-07T09:31:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/leveling-the-playing-field-for-all-with-mdr\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/leveling-the-playing-field-for-all-with-mdr\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/leveling-the-playing-field-for-all-with-mdr\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/mdr-launch-crb-thumb-250x250.png\",\"contentUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/mdr-launch-crb-thumb-250x250.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/leveling-the-playing-field-for-all-with-mdr\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Leveling the playing field for all with MDR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Leveling the playing field for all with MDR - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/new-products\/leveling-the-playing-field-for-all-with-mdr\/","og_locale":"zh_HK","og_type":"article","og_title":"Leveling the playing field for all with MDR - Version 2","og_description":"One thing that every company, from the smallest busines [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/new-products\/leveling-the-playing-field-for-all-with-mdr\/","og_site_name":"Version 2","article_published_time":"2024-05-07T09:31:51+00:00","og_image":[{"url":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/mdr-launch-crb-thumb-250x250.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"7 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/new-products\/leveling-the-playing-field-for-all-with-mdr\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/05\/leveling-the-playing-field-for-all-with-mdr\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Leveling the playing field for all with MDR","datePublished":"2024-05-07T09:31:51+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/05\/leveling-the-playing-field-for-all-with-mdr\/"},"wordCount":1358,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.eset.com\/blog\/new-products\/leveling-the-playing-field-for-all-with-mdr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/mdr-launch-crb-thumb-250x250.png","keywords":["ESET","2024"],"articleSection":["2024","ESET","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/new-products\/leveling-the-playing-field-for-all-with-mdr\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/05\/leveling-the-playing-field-for-all-with-mdr\/","url":"https:\/\/www.eset.com\/blog\/new-products\/leveling-the-playing-field-for-all-with-mdr\/","name":"Leveling the playing field for all with MDR - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eset.com\/blog\/new-products\/leveling-the-playing-field-for-all-with-mdr\/#primaryimage"},"image":{"@id":"https:\/\/www.eset.com\/blog\/new-products\/leveling-the-playing-field-for-all-with-mdr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/mdr-launch-crb-thumb-250x250.png","datePublished":"2024-05-07T09:31:51+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/new-products\/leveling-the-playing-field-for-all-with-mdr\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/new-products\/leveling-the-playing-field-for-all-with-mdr\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.eset.com\/blog\/new-products\/leveling-the-playing-field-for-all-with-mdr\/#primaryimage","url":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/mdr-launch-crb-thumb-250x250.png","contentUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/mdr-launch-crb-thumb-250x250.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/new-products\/leveling-the-playing-field-for-all-with-mdr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Leveling the playing field for all with MDR"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-kke","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/78134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=78134"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/78134\/revisions"}],"predecessor-version":[{"id":78138,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/78134\/revisions\/78138"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=78134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=78134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=78134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}