Network data: How the modern SOC succeeds at IR and threat hunting

The SOC Visibility Triad comprises logs within a SIEM; agent data from endpoint & response solutions; and network data - which is the best of those as it can't be turned off or erased. But SOCs rarely see it first.

by Jeff Costlow

To access this content please sign in or register below for free

SIGN IN

Having trouble signing in?

Contact Customer Support at
scsupport@haymarket.com
or call 020 8267 8121

REGISTER NOW FOR FREE

REGISTRATION BENEFITS

  • Full access to feature, opinion and review content
  • The weekly SC Newswire bulletin
  • The Buyers' Guide of the latest products, and salary survey

Create an account now

Video and interviews