Best Practices for Network Security Threat Hunting

Learn how you can go beyond the traditional perimeter security provided by a firewall, IPS, etc. to actively search for threats that have infiltrated your network.

Threat hunting looks at data at rest (e.g. data lakes) and at data on the move (i.e. the data flowing in and out of servers). This capability allows you to deploy a solution to either analyze data in real-time or at a later date to determine if your network has been compromised.

This webinar will define the benefits of threat hunting and best practices for deployment of threat hunting.