We are focusing on the development of indigenous endpoint detection and response tool to meet the required need of today?s industrial world to secure and protect from cyber-attacks. Our developed solution will follow the concept of Endpoint Detection and Response (EDR) with complete endpoint host de
Malware Identification using Endpoint Detection and Response to Safeguard Enterprise Networks
We are focusing on the development of indigenous endpoint detection and response tool to meet the required need of today’s industrial world to secure and protect from cyber-attacks. Our developed solution will follow the concept of Endpoint Detection and Response (EDR) with complete endpoint host detection with central management of threats emerging threats and anomalies in IT environment. EDR is an element of endpoint protection which provides continuous monitoring and response to advanced threats on endpoints and along with Centralized Access Control that will fortify the enterprise network.

The main objective is to develop an effective EDR: We also aim the following things in our project.
We will be using Virtual Environment techniques for monitoring threats and detection. Our final product will be an efficient endpoint detection and response mechanism which will be able to predict, prevent, respond and analyze the system. This will be done using multiple open source tools and integration of our indigenous detection engine.
Our product will scan and compare with the database of signatures of malware present in our database, and then indicate any threat which may occur in the system. This will be done using centralized management system to ease organizations to keep an eye on the network and threats emerging in there networks.
With data breach counts increasing and mitigation costs rising, it’s important to strengthen endpoint security as part of an overall defense in depth security strategy. Layering endpoint security with Security Information and Event Management (SIEM) solutions is one way to strengthen defenses and keep organizations safe our solution will be integrated with third party SIEM products also.
Improve Visibility and Endpoint Threat Detection
Save Time and Money
Increase Operational Effectiveness
EDR is transforming endpoint protection by securing sensitive data found on workstations and servers for organizations of all sizes, from small-to medium-sized businesses (SMBs) to multi-branch businesses and enterprises. What’s in it for you as a service provider? Many Managed Service Providers (MSPs) are looking to expand their revenue by adding security services to their portfolio. Organizations are more familiar with EDR use cases and benefits, facilitating rising customer adoption rates. EDR, therefore, provides fast time-to-value for providers by solving highly-visible endpoint security challenges.
Our EDR will be consistently updated with progressive malware signatures. Any activity which tries to manipulate data in the specified directories, will be detected, analyzed, and deleted if the need occurs. This process will take place at multiple endpoint agents by the network administrator, who can also monitor real time threat alerts from the centralized controlling system.
Any agent indicating any sort of threat will be quarantined immediately from the server, until it gets analyzed by the security analyst of organization.
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| memory chips | Equipment | 7 | 5700 | 39900 |
| Solid-State Drive | Equipment | 5 | 6000 | 30000 |
| Documentation/Printing/Binding | Miscellaneous | 1 | 10000 | 10000 |
| Total in (Rs) | 79900 |
article writing website Project Objectives (less than 2500 characters)
In this project we intend to build a gesture based system to control the presentation navi...
Notice Boards are almost used everywhere, such as office, schools, hospitals, and...
A twisting machine belongs to the category of one of the most common textile machinery tha...
The target of this project is to come up with a handheld surgical tool adapting a tactile...