endpoint visibility

jake

Best Practices in Network Forensics, Part II: Insider Threats

In part 1 of our Best Practices in Network Forensics we discussed different integrations and how you can tie in your existing tools with our solution to correlate events with syslogs, DNS, IPAM, and cloud infrastructure logs. This blog will go a bit deeper on these integrations, but focus on tracking insider threats and lateral …

Best Practices in Network Forensics, Part II: Insider Threats Read More »