-
Dec 18th, 2013
ThreatConnect Takes Signature Management to the Next Level
In modern enterprises, signature based threat detection capabilities are still considered a fundamental building block in most network defense strategies. To stay ahead of today’s sophisticated th
-
Nov 7th, 2013
Quickly Assess Maliciousness of Suspicious Activity with “Analyze”
Today’s IT security professionals are faced with mounting piles of log files, suspected malicious email attachments, and malware samples that could provide evidence of an attempted intrusion int
-
Aug 10th, 2010
5 Ways to Make Threat Analysis Actionable
What is Threat Analysis? Learn 5 Ways to Make it Actionable! Lights, Camera, All Quiet on Threats (Set) – Action! – What goes into the creation of your favorite movies? They have a directo