Network Threat Hunting
Observes traffic on the internal network to detect abnormal or unwanted network connections.
Network Threat Hunting includes:
- A thorough search through network activity to detect threats that can evade existing security solutions.
- Looking through the network for any suspect traffic that would indicate a security compromise.
This service requires installing a sniffer on the network but does not require decryption of protected information. Network Threat Hunting runs in parallel to your existing network appliances, and collects 3 days of forensic evidence from your network.