10 Apr 2013

5 minutes with Threat Analysis

0 comments Permalink Wednesday, April 10, 2013
Packetloop's Threat Analysis feature allows you to step through attacks play by play to accurately confirm indicators of compromise with real evidence. This screencast follows on from my last post "From Indicators of Compromise to Smoking Guns".

As you can see security analysts have the ability to identify and undersand attacks incredibly fast. They can visualize the entire attack timeline and walk through every packet step by step. Using the Advanced Filter they can quickly identify who the source of attack is, how the breach took place, how long the attacker was inside the network and what systems were affected and what information was accessed or stolen.