{"id":3741,"date":"2020-07-29T06:36:21","date_gmt":"2020-07-29T11:36:21","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=3741"},"modified":"2020-07-28T16:55:57","modified_gmt":"2020-07-28T21:55:57","slug":"tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/","title":{"rendered":"Tech Talks: Stop Malicious Actors Fast With Threat Detection and Response Software"},"content":{"rendered":"<div id=\"main-content\" class=\"wiki-content\">\n<div class=\"contentLayout2\">\n<div class=\"columnLayout two-equal\" data-layout=\"two-equal\">\n<div class=\"cell normal\" data-type=\"normal\">\n<div class=\"innerCell\">\n<p><em><img decoding=\"async\" class=\"alignleft size-medium wp-image-3742\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cybersecurity-threat-detection-300x200.jpg\" alt=\"A close up view of a person holding a magnifying glass over a screen covered in rows of tiny glowing green computers. One computer glows red, at the center of the magnifying glass, symbolizing a machine infected with malware.\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cybersecurity-threat-detection-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cybersecurity-threat-detection-1024x683.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cybersecurity-threat-detection-768x512.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cybersecurity-threat-detection-1536x1024.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cybersecurity-threat-detection-2048x1365.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cybersecurity-threat-detection-200x133.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>In order to serve as a trusted advisor to our clients, we need to stay up to speed with the latest IT trends and solutions. To achieve that, our team of IT experts attends weekly training sessions conducted by various IT solution providers.\u00a0Based on our extensive experience and sales volume with the suppliers, we receive exclusive, direct and usually in-person training from these suppliers.\u00a0Our Tech Talks blog series offers a snapshot of these educational\u00a0sessions.<br \/>\n<\/em><\/p>\n<p>With many workers still\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/remote-work-resource-roundup-9-blog-entries-for-business-leaders-navigating-the-new-normal\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">logging on remotely<\/a>\u00a0because of the pandemic,\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">cybersecurity<\/a>\u00a0has become more complicated due to new vulnerabilities created by work-from-home infrastructure, employees using their personal devices for professional purposes and other factors. If you&#8217;re looking for a way to identify and respond to IT security threats faster and more effectively, you might want to consider software from a supplier in our partner network that offers cutting-edge security solutions for enterprises and global businesses aiming to safeguard their data in an increasingly digital world.<\/p>\n<p>Our\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/trusted-advisor.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">team of trusted advisors<\/a>\u00a0recently attended a virtual meeting with representatives of this provider to go over what they offer and how they leverage advanced technology to protect their clients from evolving threats. Here&#8217;s what you should know about them and their Threat Detection and Response (TDR) offering.<\/p>\n<h2>Provider Overview<\/h2>\n<p>For nearly 20 years, this Atlanta-based supplier has helped businesses of all sizes around the world combat rapidly emerging and increasingly advanced threats with intelligent security solutions. With a team of hundreds of top security responders. analysts and researchers, the provider leverages experience and expert knowledge to deliver the highest possible level of protection. They serve more than 4,000 customers in over 50 countries and process upward of 300 billion security events every day.<\/p>\n<h2>Featured Offering: Threat Detection and Response<\/h2>\n<p>This supplier&#8217;s TDR platform is a Software as a Service (SaaS) solution that gives you the tools needed to identify new and advanced threats and quickly and efficiently take action to neutralize and eliminate them. The platform uses the following features to help you identify, investigate and respond to suspicious activity:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>AI and advanced analytics\u00a0<\/strong>to find threats that evade other security solutions<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Network insights\u00a0<\/strong>from threats discovered in other customers&#8217; IT environments<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Built-in high-level threat intelligence\u00a0<\/strong>drawn from decades of data and thousands of continually updated threat indicators<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Automation\u00a0<\/strong>that streamlines correlation of events across your environment, containment and prevention<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>And more<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Our team provides similar cybersecurity detection and response services tailored for small businesses and mid-market organizations. For enterprise or global clients, this supplier is one of the third parties we would recommend.<\/p>\n<p>If you&#8217;d like to learn more about cybersecurity solutions from this supplier as well as others in our partner network, don&#8217;t hesitate to contact our team of trusted technology advisors. We can provide you with an objective, side-by-side comparison of all your options. It also won&#8217;t cost you any more to go through us than it would to work directly with the solution provider because of our price parity guarantee.<\/p>\n<p>In addition, if you&#8217;d like a fully managed solution or want to further improve your security posture, the Stratosphere Networks team offers a wide range of\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-services.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">managed cybersecurity services and products<\/a>, such as endpoint and network\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/managed-detection-and-response.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Managed Detection and Response (MDR)<\/a>,\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/security-operations-center-as-a-service.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Security Operations Center as a Service (SOCaaS)<\/a>,\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/cybersecurity-incident-response.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">incident response services<\/a>,\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/office-anywhere.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">zero-trust network architecture<\/a>,\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/it-security-assessment-offering.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">security risk assessments<\/a>\u00a0and more.<\/p>\n<p>For more information, give us a call at\u00a0877-599-3999 or email\u00a0<a class=\"external-link\" href=\"mailto:sales@stratospherenetworks.com.\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">sales@stratospherenetworks.com.<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In order to serve as a trusted advisor to our clients, we need to stay up to speed with the latest IT trends and solutions. To achieve that, our team of IT experts attends weekly training sessions conducted by various &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":3742,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[262],"tags":[],"class_list":["post-3741","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-talks"],"yoast_head":"<title>Stop Malicious Actors Fast With Threat Detection and Response<\/title>\n<meta name=\"description\" content=\"With Threat Detection and Response (TDR) software, you&#039;ll gain the ability to identify and neutralize advanced cybersecurity threats quickly.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stop Malicious Actors Fast With Threat Detection and Response\" \/>\n<meta property=\"og:description\" content=\"With Threat Detection and Response (TDR) software, you&#039;ll gain the ability to identify and neutralize advanced cybersecurity threats quickly.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-29T11:36:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cybersecurity-threat-detection-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Steve Melchiorre\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve Melchiorre\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/\"},\"author\":{\"name\":\"Steve Melchiorre\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e\"},\"headline\":\"Tech Talks: Stop Malicious Actors Fast With Threat Detection and Response Software\",\"datePublished\":\"2020-07-29T11:36:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/\"},\"wordCount\":581,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cybersecurity-threat-detection.jpg\",\"articleSection\":[\"Tech Talks with the CEO\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/\",\"name\":\"Stop Malicious Actors Fast With Threat Detection and Response\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cybersecurity-threat-detection.jpg\",\"datePublished\":\"2020-07-29T11:36:21+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e\"},\"description\":\"With Threat Detection and Response (TDR) software, you'll gain the ability to identify and neutralize advanced cybersecurity threats quickly.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cybersecurity-threat-detection.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cybersecurity-threat-detection.jpg\",\"width\":2121,\"height\":1414,\"caption\":\"A close up view of a person holding a magnifying glass over a screen covered in rows of tiny glowing green computers. One computer glows red, at the center of the magnifying glass, symbolizing a machine infected with malware.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tech Talks: Stop Malicious Actors Fast With Threat Detection and Response Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e\",\"name\":\"Steve Melchiorre\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aaa5cea4658bc449a41012c1a4ae71a2c1803babf8ec3254c2ee67fdfad0e5de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aaa5cea4658bc449a41012c1a4ae71a2c1803babf8ec3254c2ee67fdfad0e5de?s=96&d=mm&r=g\",\"caption\":\"Steve Melchiorre\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/stevemelchiorre\/\"}]}<\/script>","yoast_head_json":{"title":"Stop Malicious Actors Fast With Threat Detection and Response","description":"With Threat Detection and Response (TDR) software, you'll gain the ability to identify and neutralize advanced cybersecurity threats quickly.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/","og_locale":"en_US","og_type":"article","og_title":"Stop Malicious Actors Fast With Threat Detection and Response","og_description":"With Threat Detection and Response (TDR) software, you'll gain the ability to identify and neutralize advanced cybersecurity threats quickly.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2020-07-29T11:36:21+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cybersecurity-threat-detection-1024x683.jpg","type":"image\/jpeg"}],"author":"Steve Melchiorre","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Steve Melchiorre","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/"},"author":{"name":"Steve Melchiorre","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e"},"headline":"Tech Talks: Stop Malicious Actors Fast With Threat Detection and Response Software","datePublished":"2020-07-29T11:36:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/"},"wordCount":581,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cybersecurity-threat-detection.jpg","articleSection":["Tech Talks with the CEO"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/","name":"Stop Malicious Actors Fast With Threat Detection and Response","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cybersecurity-threat-detection.jpg","datePublished":"2020-07-29T11:36:21+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e"},"description":"With Threat Detection and Response (TDR) software, you'll gain the ability to identify and neutralize advanced cybersecurity threats quickly.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cybersecurity-threat-detection.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cybersecurity-threat-detection.jpg","width":2121,"height":1414,"caption":"A close up view of a person holding a magnifying glass over a screen covered in rows of tiny glowing green computers. One computer glows red, at the center of the magnifying glass, symbolizing a machine infected with malware."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/tech-talks-stop-malicious-actors-fast-with-threat-detection-and-response-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Tech Talks: Stop Malicious Actors Fast With Threat Detection and Response Software"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e","name":"Steve Melchiorre","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/aaa5cea4658bc449a41012c1a4ae71a2c1803babf8ec3254c2ee67fdfad0e5de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aaa5cea4658bc449a41012c1a4ae71a2c1803babf8ec3254c2ee67fdfad0e5de?s=96&d=mm&r=g","caption":"Steve Melchiorre"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/stevemelchiorre\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=3741"}],"version-history":[{"count":2,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3741\/revisions"}],"predecessor-version":[{"id":3744,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3741\/revisions\/3744"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3742"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=3741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=3741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=3741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}