How packets, syslogs, and NetFlow can help keep out the data rustlers and clear your name in court
When it comes to your network, roping a wild mustang may seem easier than harnessing the data you need to prove or disprove foul play. Metadata, syslogs, packets, and other data sources can lead you in circles if you don’t know which trail to follow, especially in the event of a breach.
In this webinar, learn how to:
- Understand and use the right source data
- Leverage traffic-capture strategies that work
- Protect yourself before, during, and after a breach
Network pros Tim O’Neill and Mike Canney have helped numerous enterprises with investigations and now they circle the wagons to reveal their source data of choice in a series of security scenarios.