Advanced threat protection - Further Information
This page shows up to 100 pieces of content (newest at the top):
UEBA technologies focus on identifying patterns of activity that are outside of the normal patterns expected in order to identify activity that could be suspicious or clearly malicious.
Phishing has emerged as a key factor in most security breaches. Where email used to be the primary means of delivering such attacks, technology advances and raised awareness are making such attacks less effective.
Turning the tables on cyber criminals - using the cyber kill chain framework to protect your organisation
This document describes what options are available for disrupting attackers at each stage of the kill chain.
This document introduces the concept of IOCs and explains how organisations can use them for their benefit.
The need to secure all business communications - a competitive overview of major players in the market
The market for email and web security has seen much consolidation recently and this has changed the landscape considerably.