Skip to main content

Guest:








Topics covered:


 



  • Why do we need Application Detection and Response (ADR)? BTW, how do you define it?

  • Isn’t ADR a subset of CDR (for cloud)?  What is the key difference that sets ADR apart from traditional EDR and CDR tools?

  • Why can’t I just send my application data - or eBPF traces - to my SIEM and achieve the goals of ADR that way?

  • We had RASP and it failed due to instrumentation complexities. How does an ADR solution address these challenges and make it easier for security teams to adopt and implement?

  • What are the key inputs into an ADR tool?

  • Can you explain how your ADR correlates cloud, container, and application contexts to provide a better  view of threats? Could you share real-world examples of types of badness solved for users?

  • How would ADR work with other application security technologies like DAST/SAST, WAF and ASPM?

  • What are your thoughts on the evolution of ADR?




Be the first to reply!

Reply