RSS feed Get our RSS feed

News by Topic

Endpoint Detection and Response Cloud


Security teams face sophisticated attacks that ‘hide in plain sight’ and often dwell in customer environments as long as 190 days1. And attackers increasingly employ stealthy techniques to move freely within a customer environment like using stolen credentials to masquerade as legitimate users. There has been a marginal decline in zero-day discoveries and an increase in ‘living off the land’ tactics that don’t rely on the traditional combination of vulnerabilities followed by malware. These tactics are more difficult to detect since they make use of legitimate tools.

Tags : security, software, detection, network
 Email this page
Published:  Dec 13, 2017
Length:  4
Type:  White Paper