It is common practice for bad actors to work within a non-target enterprise to figure out what attacks are detected, and what attacks are not detected, by agent-based endpoint detection & response (EDR) technology. In other words, agent-based technologies are highly likely to be “gamed.” Since bad actors can’t predict when an agent-less technology will be present, or not, on a given computer, their ability to game that software is greatly reduced. That’s why Endpoint Talon is agent-less.
The Endpoint Talon is highly effective in understanding host threats. The Blackhawk enables correlation of Endpoint Talon host information with network-based data sources to see a bigger picture. Both the Endpoint Talon and the Blackhawk, with Endpoint Talon included, are valuable tools to view threats.