Finding Incidents Using Web Filtering Data

Logo
Presented by

Tim Wenzlau, Product Manager, Mike Reynolds, Product Marketing Manager

About this talk

Web filtering data can be a treasure trove of threat activity (PUPs/PUAs). The challenges with finding these threats come from the vast volume of sensor data. PUP malware beaconing signals may or may not occur at regular intervals and a human security analyst can't be expected to keep track of all the web requests generated by a single host for an hour, let alone a day or a week. The solution to this challenge is Robotic Decision Automation, which can consider over 60 factors specific to web filtering data when identifying malware and other malicious activity.  Key takeaways from this webinar: -Web filter data volume is no longer an issue for monitoring -Monitoring HTTPS traffic reduces Mean Time to Respond (MTTR) -The Respond Analyst is the first solutions that allows for real-time analysis and triage of web proxy data The Respond Analyst integrates with leading web proxy vendors: Palo Alto Networks, Symantec, McAfee, Cisco, Forcepoint, Carbon Black and ZScaler.

Related topics:

More from this channel

Upcoming talks (7)
On-demand talks (433)
Subscribers (95035)
Mandiant provides public and private organizations and critical infrastructure worldwide with early threat insights through unmatched intelligence and response expertise for the highest-profile incidents.