The second phase in the adaptive protection cycle assumes that the malware or targeted attack managed to bypass the barriers placed in the Protection Phase, and infected one or several computers on the network, going unnoticed by users.
In this phase, Adaptive Defense 360 implements a number of novel technologies that allow the network administrator to pinpoint the problem.
Related topics