> Lancope > Hunting Attackers with Network Audit Trails

Hunting Attackers with Network Audit Trails

Free Offer Published By: Lancope
Published:  Jun 21, 2014
Type:  Free Offer

Find out how to detect sophisticated cyber attacks using network logging technologies (e.g. NetFlow and IPFIX).  See how you can use these technologies to create an audit trail of network activity. Understand how to analyse the data so that you can: 

  • Uncover anomalous traffic
  • Discover active attacks in each phase of the attacker’s kill chain.
  • Determine the scope of successful breaches and document the timeline of the attack
  • Accelerate incident response and improve forensic investigations

Tags : 
lancope, cyberattack, cyber criminals, network security, hackers, audit trail, cyber audit, network intelligence