Many endpoint threat detection and response solutions reactively collect the necessary data for a response after detection—extending the dwell time of advanced and targeted threats. A new approach is required. One that focuses on the proactive collection and monitoring of the necessary data required for effective response. Join Ben Johnson, chief security strategist for Bit9 + Carbon Black, to learn: