Advanced threat detection with Cisco Stealthwatch - using anomaly detection

preview_player
Показать описание
Рекомендации по теме
Комментарии
Автор

I'm not clear that this video was that useful. It is too high-level, and its use depends on whether you have things configured correctly. In general I find that the cleverness of proprietary products sometimes gets in the way of the analysts being able to interpret things as they are, without having to first decipher what they algorithms and dashboards are suggesting is anomalous and a potential threat.

compegord