Multisig (Global)

High-quality technical overview of Multisig in the context of blockchain security.

Contenu en attente de traduction. Affichage de la version anglaise.

Components: 1. EDR/XDR. 2. Data Loss Prevention (DLP). 3. Device Control (USB blocking). 4. Host-based Firewall. 5. Patch Management.

        graph LR
  Center["Multisig (Global)"]:::main
  Rel_multi_sig["multi-sig"]:::related -.-> Center
  click Rel_multi_sig "/terms/multi-sig"
  classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
  classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
  classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
  classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
  linkStyle default stroke:#4b5563,stroke-width:2px;

      

🧒 Explique-moi comme si j'avais 5 ans

Imagine you have a big office building. Instead of just having a guard at the front door, you have a private security officer assigned to every single person who works there. That officer follows them everywhere (even when they go home) to make sure they don't accidentally bring something dangerous into the building. That's [endpoint security](/fr/terms/endpoint-security).

🤓 Expert Deep Dive

Technically, we have evolved from 'Endpoint Protection Platforms' (EPP), which use signature-based detection, to 'Endpoint Detection and Response' (EDR). EDR tools use 'Heuristics' and 'Behavioral Analytics' to identify threats. For example, if a process starts 'Process Hollowing' or excessive 'Disk Encryption', the EDR can automatically isolate the host from the network. Another critical component is 'Zero Trust'—the assumption that the endpoint is already compromised until proven otherwise. This includes 'Posture Checks' (verifying the OS is patched and encryption is active) before allowing access to corporate resources.

📚 Sources