About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Elastic Introduces the Industry’s First Free and Open Limitless XDR

New Capabilities Unify SIEM, Security Analytics and Endpoint Security, Enabling Customers to Stop Threats at Cloud Scale on a Single Platform

Elastic (NYSE: ESTC) (“Elastic”), the company behind Elasticsearch and the Elastic Stack, today announced the launch and general availability of the industry’s first free and open Limitless Extended Detection and Response (XDR).

Part of Elastic Security, Elastic Limitless XDR modernizes security operations by unifying the capabilities of security information and event management (SIEM), security analytics, and endpoint security.

"Organizations have been spending regularly on threat detection and response but still can't detect sophisticated threats,” says Jon Oltsik, Senior Principal Analyst at ESG. “By aggregating threat detection and response across multiple controls, XDR promises to improve threat detection and response, correlating endpoint detections with telemetry from other sources to simplify investigation and streamline operations.”

Elastic Limitless XDR is anchored in SIEM and enriched by a single agent for endpoint security to eliminate data silos, reduce alert fatigue, and arm practitioners to stop threats at cloud scale. Built into a single platform, Elastic Limitless XDR extends visibility across any environment to prevent, detect, and respond to threats and eliminate blind spots, everywhere.

According to the IDC EDR and XDR 2020 Survey, 55% of organizations currently use up to six endpoint security technologies. “While EDR technologies remain a popular choice for helping organizations strengthen their security posture, XDR is gaining in popularity as security teams require telemetry from many sources beyond the endpoint,” says Chris Kissel, Research Director Security & Trust Products IDC.

Elastic Limitless XDR powers centralized analytics on years’ worth of data, automates key processes, and brings native endpoint security to every host.

Elastic Limitless XDR stops threats at cloud scale on a single platform by:

Extending visibility across any environment to eliminate security blind spots

  • Block malware and ransomware, perform collection and inspection, detect and take responsive actions on the endpoint, and support DevSecOps and observability use cases by collecting application traces through a single agent.
  • Accelerate security operations with automated hunting and investigation workflows, built-in case management, and hundreds of one-click integrations created by Elastic and its global user community.
  • Deploy on premises, in the cloud, or hybrid.

Providing fast, cost-effective search to meet the evolving needs of security teams

  • Ingest and prepare data from across any environment and search it in milliseconds to seconds with the frozen data tier, powered by searchable snapshots, on low-cost object stores such as Amazon S3, Google Cloud Storage, and Microsoft Azure Storage.
  • Efficiently retain years of actionable telemetry to uncover long-dwelling threats and markers of newly discovered exploits.
  • Uniformly analyze information stored across multiple clouds without the delay and expense of backhauling data.

Automating threat detection to reduce alert fatigue

  • Automate threat detection with rules built by Elastic and community security researchers and shared on a public detection rules repository.
  • Uncover security-relevant anomalies with prebuilt machine learning jobs.
  • Aggregate results, prioritize, and investigate across multi-cloud environments.

For more information read the Elastic blog about what’s new in Elastic Security 7.14.

Supporting Quotes:

  • “Elastic has disrupted the cyber security industry by providing an extensible product line that allows the State of South Dakota to detect endpoint, network, and even cloud threats at a very reasonable cost. Beyond the threat investigation aspect of the Elastic Security product is the community and open code that allows us to work with others in the industry and tailor the needs of our cyber security analysts and engineers to our organization. Having the Elastic stack as part of our security operations infrastructure has pushed us further to being a world class SOC so that we can best protect the State of South Dakota from cyber threats." - Nicholas Penning, Cybersecurity Architect at the State of South Dakota Bureau of Information and Telecommunications
  • “Elastic has given Sally Beauty the ability to streamline the security stack, while greatly expanding detection and prevention capabilities. Having one unified agent that can collect endpoint and network telemetry data, while also providing world-class prevention, has been a real game changer. The move to a decentralized workforce, due to the pandemic, would have previously left us scrambling to not lose capabilities. But due to the benefits of Elastic Cloud, we were perfectly positioned to continue securing our assets and infrastructure, regardless of location. With the Elastic Security Platform, our Security Operations Team has everything we need to Prevent, Detect & Respond to Cyber Security Threats.” - Sr. Information Security Engineer, Sally Beauty.
  • “Between today’s advanced attack techniques and complicated IT environments, it is more difficult than ever for organizations to stop threats before damage is done. Adding to this challenge, security teams have to pivot between multiple tools to investigate and respond fully to attacks. By combining SIEM and endpoint security, Elastic Limitless XDR provides fast detection and response capabilities with cloud, user, endpoint, and network telemetry to simplify investigation and response on a single platform.” - Nate Fick, General Manager, Security at Elastic

About Elastic:

Elastic is a search company built on a free and open heritage. Anyone can use Elastic products and solutions to get started quickly and frictionlessly. Elastic offers three solutions for enterprise search, observability, and security, built on one technology stack that can be deployed anywhere. From finding documents to monitoring infrastructure to hunting for threats, Elastic makes data usable in real time and at scale. Thousands of organizations worldwide, including Cisco, eBay, Goldman Sachs, Microsoft, The Mayo Clinic, NASA, The New York Times, Wikipedia, and Verizon, use Elastic to power mission-critical systems. Founded in 2012, Elastic is a distributed company with Elasticians around the globe and is publicly traded on the NYSE under the symbol ESTC. Learn more at elastic.co.

The release and timing of any features or functionality described in this document remain at Elastic’s sole discretion. Any features or functionality not currently available may not be delivered on time or at all.

Elastic and associated marks are trademarks or registered trademarks of Elastic N.V. and its subsidiaries. All other company and product names may be trademarks of their respective owners.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.