The term "Browser Detection and Response" is used because Weaklayer resembles Endpoint Detection and Response in architecture. The key difference being that instead of an endpoint agent, it uses a browser extension.
Having a presence in the web browser like this enables a novel source of security data.
This gives you new capabilities and allows you to implements new controls in your IT environment.
Since Weaklayer gives a new data source, it isn't a replacement for any tools you currently use in your security stack. It's meant to be used along with your existing IT security stack.
A great example of the new capabilities you get is credential phishing detection.
By monitoring user interaction with web pages, you can see when an employee enters their corporate password into a non-corporate website.
The video on the Weaklayer homepage demos this.
Any and all feedback is appreciated!
Send me an email if you prefer private communication or want a hand setting it up.
The term "Browser Detection and Response" is used because Weaklayer resembles Endpoint Detection and Response in architecture. The key difference being that instead of an endpoint agent, it uses a browser extension.
Having a presence in the web browser like this enables a novel source of security data. This gives you new capabilities and allows you to implements new controls in your IT environment.
Since Weaklayer gives a new data source, it isn't a replacement for any tools you currently use in your security stack. It's meant to be used along with your existing IT security stack.
A great example of the new capabilities you get is credential phishing detection. By monitoring user interaction with web pages, you can see when an employee enters their corporate password into a non-corporate website. The video on the Weaklayer homepage demos this.
Any and all feedback is appreciated! Send me an email if you prefer private communication or want a hand setting it up.
Finally, here is the source for the browser extension: https://github.com/weaklayer/sensor