filmov
tv
Cyber Threat Investigation Workflow
Показать описание
This video shows how enterprise security teams can rapidly investigate alarms and events, including malware. This process makes use of NetFlow and external metadata to quickly gather context and identify the origin of threats. Details are gathered to identify who was involved with the threat, how the infection may have spread, where it went, and when.