Talk With an Expert

Shedding Light on Security Incidents Using Network Flows

Shedding Light on Security Incidents Using Network Flows (PDF, 2.73MB)Published: 16 May, 2012
Created by:
Kevin Gennuso

Knowing which hosts are involved in a security incident is vital information to any incident handler. The faster the attackers and their targets can be identified, the quicker the incident can be contained.

Shedding Light on Security Incidents Using Network Flows