Introduction

 

When the Adaptive Defense 360 dashboard displays an infection, it needs to be determined to what extent the network has been compromised and how to protect it from future attacks.

New generation malware is characterized by going undetected for long periods of time, taking advantage of this to access sensitive data or company intellectual property.  Its objective is economic gain, either through blackmail by encrypting company documents or selling the information obtained to the competition, among other strategies common to these types of attacks.

Whatever the case, it is vital to determine the actions that the malware performed on the network in order to take appropriate measures. Adaptive Defense 360 is able to continuously monitor all actions triggered by threats and store them to show their path, from their initial appearance on the network until their neutralization.

Adaptive Defense 360 visually displays this type of information in two ways: through action tables and graphs.

 

 


Related topics

Forensic analysis using the action tables

Subject and predicate in the actions