WhitePaper

Six Steps to Successful and Efficient Threat Hunting

Threat hunting allows security admins to identify adversaries before they have triggered an alert, making it ideal for stopping Zero-Day attacks. This technology can be used to answer questions like:

  • Why do I see ftp traffic to a country that we don’t do business with?
  • Why do I see an abnormal volume of DNS traffic from a single machine?