{"id":15434,"date":"2020-05-04T11:06:28","date_gmt":"2020-05-04T16:06:28","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=15434"},"modified":"2025-12-19T14:47:29","modified_gmt":"2025-12-19T19:47:29","slug":"what-is-fortiedr","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/what-is-fortiedr\/","title":{"rendered":"What is FortiEDR: Real-time Protection Before and After Infection"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"15434\" class=\"elementor elementor-15434\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7af35b2e e-flex e-con-boxed e-con e-parent\" data-id=\"7af35b2e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-67486519 elementor-widget elementor-widget-text-editor\" data-id=\"67486519\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Introducing FortiEDR<\/h3><p>Advanced endpoint protection is a must for any organization, and one of the most comprehensive solutions out there was built from the ground up for end-to-end security: FortiEDR. In case you missed it, <a href=\"https:\/\/www.firewalls.com\/blog\/what-is-edr\/\" target=\"_blank\" rel=\"noopener noreferrer\">EDR stands for Endpoint Detection and Response<\/a>. But that only begins to describe the total protection you get with FortiEDR.<\/p><p><a href=\"https:\/\/www.fortinet.com\/products\/endpoint-security\/fortiedr.html\" target=\"_blank\" rel=\"noopener noreferrer\">FortiEDR<\/a> offers something far beyond first generation endpoint offerings: Real-Time Protection, pre- and post-incident. That means it&#8217;s proactively working 24\/7\/365 to stop infections before they start. And if you somehow get infected, it jumps all over the infection with heavy artillery to make your network whole again.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-022fb4f e-grid e-con-full e-con e-child\" data-id=\"022fb4f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45d6462 elementor-widget elementor-widget-image\" data-id=\"45d6462\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" data-src=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/05\/FortiEDR-1.png\" title=\"\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 574px; --smush-placeholder-aspect-ratio: 574\/619;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f008ca elementor-widget elementor-widget-text-editor\" data-id=\"2f008ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Pre-Infection<\/h3><p>What does FortiEDR do to stop malware before it gets to your network? It proactively discovers any rogue endpoints and unsecure IoT (internet of things) devices &#8211; let&#8217;s face it there can be a lot. Meanwhile, it continuously scans for vulnerabilities and comes with risk-based policies that make it harder for attackers to get in. And if it finds vulnerabilities? You get virtual patches. It&#8217;l likely to catch even the wildest of wild malware with its machine learning antivirus engine and signature-less detection that can block threats before execution.<\/p><h3>Post-Infection<\/h3><p>If any threats do find their way through, FortiEDR is ready to stop them in &#8211; did I mention? &#8211; <a href=\"https:\/\/www.fortinet.com\/blog\/business-and-technology\/every-second-counts-in-endpoint-protection-why-real-time-matters.html\" target=\"_blank\" rel=\"noopener noreferrer\">real-time<\/a>. It automatically defuses potential threats with automated response and remediation. Defusing these threats post-infection means blocking outbound communication, and stopping data tampering, exfiltration, and even the dreaded ransomware encryption.<\/p><p>Any malware that&#8217;s made even the slightest dent in your network won&#8217;t have that satisfaction for long, as FortiEDR can rollback any changes its made. It&#8217;ll also remove any of those pesky bad files that try to stick around. And this remediation and rollback all occurs without interrupting your business.<\/p><p>With all that action taking place, you&#8217;ll want to have a play-by-play, so FortiEDR offers full visibility into attacks. That means forensic data, malware classification, a memory snapshot in case of fileless attacks, and more. Plus, admins can even customize incident response playbooks with optional MDR &#8211; or managed detection and response &#8211; service.<\/p><h3>Integration<\/h3><p>Another big plus for FortiEDR is its integration into the Fortinet Security Fabric. It works seamlessly with every other Fortinet protection platform, from <a href=\"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\">FortiClient licenses<\/a> to <a href=\"https:\/\/www.firewalls.com\/brands\/fortinet\/fortigate\/smb.html\" target=\"_blank\" rel=\"noopener noreferrer\">FortiGate firewalls<\/a> to FortiSandbox sandboxing. They all speak the same language &#8211; allowing you to manage your network from a single-pane-of-glass.<\/p><h3>How do I get FortiEDR?<\/h3><p>FortiEDR licenses come in a variety of shapes and sizes. That means you have options. Choose your solution based on your number of users &#8211; aka assets &#8211; starting at 500, and the level of protection you desire. Offerings include Predict &amp; Protect, Protect &amp; Response, and Predict, Protect, &amp; Response &#8211; which covers all we discussed here. FortiEDR&#8217;s cost depends on the combination you select. The cost to your business not to have this advanced endpoint detection and response in place when an attack comes around is immeasurable. Shop now to find the right option for you!<\/p><p><a href=\"https:\/\/www.firewalls.com\/brands\/fortinet.html\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"btn btn-primary\">Shop FortiEDR<\/button><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Fortinet&#8217;s FortiEDR offers advanced endpoint detection and response in real-time, with pre- and post-incident protection. Learn more about FortiEDR.<\/p>\n","protected":false},"author":5,"featured_media":27479,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[610,600],"tags":[432,431,354],"class_list":["post-15434","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-end-user-protection","category-fortinet","tag-endpoint-detection-and-response","tag-fortiedr","tag-fortinet"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is FortiEDR: Real-time Protection Before and After Infection - Firewalls.com<\/title>\n<meta name=\"description\" content=\"Fortinet&#039;s FortiEDR offers advanced endpoint detection and response in real-time, with pre- and post-incident protection. Learn more about FortiEDR.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/what-is-fortiedr\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is FortiEDR: Real-time Protection Before and After Infection - Firewalls.com\" \/>\n<meta property=\"og:description\" content=\"Fortinet&#039;s FortiEDR offers advanced endpoint detection and response in real-time, with pre- and post-incident protection. Learn more about FortiEDR.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/what-is-fortiedr\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-04T16:06:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-19T19:47:29+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/05\/What-is-FortiEDR-Real-time-Protection-Before-and-After-Infection.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/what-is-fortiedr\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/what-is-fortiedr\\\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"What is FortiEDR: Real-time Protection Before and After Infection\",\"datePublished\":\"2020-05-04T16:06:28+00:00\",\"dateModified\":\"2025-12-19T19:47:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/what-is-fortiedr\\\/\"},\"wordCount\":515,\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/what-is-fortiedr\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/What-is-FortiEDR-Real-time-Protection-Before-and-After-Infection.png\",\"keywords\":[\"endpoint detection and response\",\"fortiedr\",\"fortinet\"],\"articleSection\":[\"End User Protection\",\"Fortinet\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/what-is-fortiedr\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/what-is-fortiedr\\\/\",\"name\":\"What is FortiEDR: Real-time Protection Before and After Infection - Firewalls.com\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/what-is-fortiedr\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/what-is-fortiedr\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/What-is-FortiEDR-Real-time-Protection-Before-and-After-Infection.png\",\"datePublished\":\"2020-05-04T16:06:28+00:00\",\"dateModified\":\"2025-12-19T19:47:29+00:00\",\"description\":\"Fortinet's FortiEDR offers advanced endpoint detection and response in real-time, with pre- and post-incident protection. Learn more about FortiEDR.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/what-is-fortiedr\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/what-is-fortiedr\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/what-is-fortiedr\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/What-is-FortiEDR-Real-time-Protection-Before-and-After-Infection.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/What-is-FortiEDR-Real-time-Protection-Before-and-After-Infection.png\",\"width\":1120,\"height\":630,\"caption\":\"What is FortiEDR: Real-time Protection Before and After Infection\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/what-is-fortiedr\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is FortiEDR: Real-time Protection Before and After Infection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/www.facebook.com\\\/firewallscom\",\"https:\\\/\\\/x.com\\\/firewallscom\",\"https:\\\/\\\/www.linkedin.com\\\/company-beta\\\/1439857\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\\\/\\\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/author\\\/aharmon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is FortiEDR: Real-time Protection Before and After Infection - Firewalls.com","description":"Fortinet's FortiEDR offers advanced endpoint detection and response in real-time, with pre- and post-incident protection. Learn more about FortiEDR.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/what-is-fortiedr\/","og_locale":"en_US","og_type":"article","og_title":"What is FortiEDR: Real-time Protection Before and After Infection - Firewalls.com","og_description":"Fortinet's FortiEDR offers advanced endpoint detection and response in real-time, with pre- and post-incident protection. Learn more about FortiEDR.","og_url":"https:\/\/www.firewalls.com\/blog\/what-is-fortiedr\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2020-05-04T16:06:28+00:00","article_modified_time":"2025-12-19T19:47:29+00:00","og_image":[{"width":1120,"height":630,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/05\/What-is-FortiEDR-Real-time-Protection-Before-and-After-Infection.png","type":"image\/png"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/what-is-fortiedr\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/what-is-fortiedr\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"What is FortiEDR: Real-time Protection Before and After Infection","datePublished":"2020-05-04T16:06:28+00:00","dateModified":"2025-12-19T19:47:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/what-is-fortiedr\/"},"wordCount":515,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/what-is-fortiedr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/05\/What-is-FortiEDR-Real-time-Protection-Before-and-After-Infection.png","keywords":["endpoint detection and response","fortiedr","fortinet"],"articleSection":["End User Protection","Fortinet"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/what-is-fortiedr\/","url":"https:\/\/www.firewalls.com\/blog\/what-is-fortiedr\/","name":"What is FortiEDR: Real-time Protection Before and After Infection - Firewalls.com","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/what-is-fortiedr\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/what-is-fortiedr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/05\/What-is-FortiEDR-Real-time-Protection-Before-and-After-Infection.png","datePublished":"2020-05-04T16:06:28+00:00","dateModified":"2025-12-19T19:47:29+00:00","description":"Fortinet's FortiEDR offers advanced endpoint detection and response in real-time, with pre- and post-incident protection. Learn more about FortiEDR.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/what-is-fortiedr\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/what-is-fortiedr\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/what-is-fortiedr\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/05\/What-is-FortiEDR-Real-time-Protection-Before-and-After-Infection.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/05\/What-is-FortiEDR-Real-time-Protection-Before-and-After-Infection.png","width":1120,"height":630,"caption":"What is FortiEDR: Real-time Protection Before and After Infection"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/what-is-fortiedr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is FortiEDR: Real-time Protection Before and After Infection"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=15434"}],"version-history":[{"count":23,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15434\/revisions"}],"predecessor-version":[{"id":27481,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15434\/revisions\/27481"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/27479"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=15434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=15434"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=15434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}