Videos and Webcasts

Top 5 Indicators of Evil on Windows Hosts: Endpoint Threat Detection and Response

Bad guys are lurking in your network neighborhood, kicking doors and testing entry points, all the time. Threatscape 2015 is evolving rapidly, but your resources and staff may not be enough to meet these challenges. Most IT security heads and admins are so busy managing operations and ensuring the company’s ongoing security efforts that “detection deficit” sets in and they miss key indicators that their network has been compromised.

Learn about:

  • Rogue process detection
  • Evidence of persistence
  • Suspicious traffic
  • Unknown processes
  • Unusual OS artifacts