> Lancope > Hunting Attackers with Network Audit Trails

Hunting Attackers with Network Audit Trails

Free Offer Published By: Lancope
Published:  Jun 21, 2014
Type:  Free Offer

Find out how to detect sophisticated cyber attacks using network logging technologies (e.g. NetFlow and IPFIX).  See how you can use these technologies to create an audit trail of network activity. Understand how to analyse the data so that you can: 

  • Uncover anomalous traffic
  • Discover active attacks in each phase of the attacker’s kill chain.
  • Determine the scope of successful breaches and document the timeline of the attack
  • Accelerate incident response and improve forensic investigations

Tags : 
lancope, cyberattack, cyber criminals, network security, hackers, audit trail, cyber audit, network intelligence, network audit, business intelligence, database security, business technology

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept