Finding Incidents Using Web Filtering Data

Presented by

Tim Wenzlau, Product Manager, Mike Reynolds, Product Marketing Manager

About this talk

Web filtering data can be a treasure trove of threat activity (PUPs/PUAs). The challenges with finding these threats come from the vast volume of sensor data. PUP malware beaconing signals may or may not occur at regular intervals and a human security analyst can't be expected to keep track of all the web requests generated by a single host for an hour, let alone a day or a week. The solution to this challenge is Robotic Decision Automation, which can consider over 60 factors specific to web filtering data when identifying malware and other malicious activity.  Key takeaways from this webinar: -Web filter data volume is no longer an issue for monitoring -Monitoring HTTPS traffic reduces Mean Time to Respond (MTTR) -The Respond Analyst is the first solutions that allows for real-time analysis and triage of web proxy data The Respond Analyst integrates with leading web proxy vendors: Palo Alto Networks, Symantec, McAfee, Cisco, Forcepoint, Carbon Black and ZScaler.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (42)
Subscribers (2385)
Respond Software is the cybersecurity investigation automation company and creator of the Respond Analyst, an XDR engine built to accelerate investigations for security operations teams. Defense agencies, government bodies, universities, large enterprises, and leading managed service providers use the Respond Analyst to get investigation power at machine speed. The Respond Analyst works with the broadest range of vendors, sensors, threat intelligence and data repositories in the industry to improve detection and response while raising security analyst productivity. Since its founding in 2016, Respond Software has partnered with more than 100 customers to apply data science to help security operations defend their enterprise. www.respond-software.com.