How to Detect Fileless Attacks with Host-Based IDS in USM Anywhere

Logo
Presented by

Danielle Russell, Group Product Marketing Manager; Aaron Genereaux, Sr. Sales Engineer

About this talk

Attackers have figured out how to bypass traditional antivirus software with fileless attacks designed to hide within sanctioned applications and even within the OS itself. Host-based intrusion detection systems (HIDS), which work by monitoring activity that is occurring internally on a host, are an effective way to detect these advanced attacks before they spread. Join this webcast to learn: - How fileless attacks work and how they evade detection by most traditional antivirus software - The types of endpoint activity that can be detected and logged by HIDS to catch threats like fileless attacks - Why HIDS is an essential security control for threat detection and compliance - How correlation of HIDS data with IP reputation data, vulnerability scans, and more can boost threat detection and response Speakers: Danielle Russell Group Product Marketing Manager Aaron Genereaux Sr. Sales Engineer
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (34)
Subscribers (72760)
Welcome to LevelBlue. We simplify cybersecurity through award-winning managed security services, experienced strategic consulting, threat intelligence and renowned research. Our team is a seamless extension of yours, providing transparency and visibility into security posture and continuously working to strengthen it. We harness security data from numerous sources and enrich it with artificial intelligence to deliver real-time threat intelligence. This enables more accurate and precise decision making. With a large, always-on global presence, LevelBlue sets the standard for cybersecurity today and tomorrow. We easily and effectively manage risk, so you can focus on your business. LevelBlue. Cybersecurity. Simplified.