Multisig (Global)
High-quality technical overview of Multisig in the context of blockchain security.
Components: 1. EDR/XDR. 2. Data Loss Prevention (DLP). 3. Device Control (USB blocking). 4. Host-based Firewall. 5. Patch Management.
graph LR
Center["Multisig (Global)"]:::main
Rel_multi_sig["multi-sig"]:::related -.-> Center
click Rel_multi_sig "/terms/multi-sig"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 5 yaşındaki gibi açıkla
Imagine you have a big office building. Instead of just having a guard at the front door, you have a private security officer assigned to every single person who works there. That officer follows them everywhere (even when they go home) to make sure they don't accidentally bring something dangerous into the building. That's [endpoint security](/tr/terms/endpoint-security).
🤓 Expert Deep Dive
Technically, we have evolved from 'Endpoint Protection Platforms' (EPP), which use signature-based detection, to 'Endpoint Detection and Response' (EDR). EDR tools use 'Heuristics' and 'Behavioral Analytics' to identify threats. For example, if a process starts 'Process Hollowing' or excessive 'Disk Encryption', the EDR can automatically isolate the host from the network. Another critical component is 'Zero Trust'—the assumption that the endpoint is already compromised until proven otherwise. This includes 'Posture Checks' (verifying the OS is patched and encryption is active) before allowing access to corporate resources.