Our latest blog post on how a new SensorFleet Sensor deployment into the partner infrastructure led to almost immediate discovery of an active Confluence vulnerability exploitation attempt.
bit.ly/sensorfleet-bl…
#Confluence #CyberSecurity #SensorFleet
New year and new adventures are just around the corner. The whole SensorFleet team wishes you a happy New Year 2022 – may it be the best one yet!
#NewYear
How did we help our customer to check their networks when Log4Shell vulnerability was reported? What was the impact on our own product? Read our latest blog post and get an insider view!
#Log4Shell
bit.ly/sensorfleet-bl…
Having visibility on network services and configuration changes is a critical piece in defensive cyber security strategy. If you’re interested in how to easily scan for both Internet exposed services and within the internal network segments, read this ⬇️
bit.ly/sensorfleet-mo…
How to get around the manual processes needed to deploy and maintain the network of honeypots, and take care of proper isolation at the same time? By reading our newest use case you’ll find out!
bit.ly/sensorfleet-de…
Majority of cyber security solutions focus on detection and protection. But finding out what has happened starts only after the initial alert. How can you accelerate your incident investigation? We’ll tell you more in our use case 👇🏻
bit.ly/sensorfleet-fo…
Complexity of IT and OT environments has increased. What to do when it is getting harder to keep track of all the devices on your networks?
Read our use case on network asset visibility and learn more! 🔎
bit.ly/sensorfleet-vi…
There are several challenges that may prevent users from getting full value out of the SIEM. How would we solve the most prominent ones?
Read more ⬇️
bit.ly/sensorfleet-ad…
Convergence of IT, OT and Cloud based networks can create unexpected connections between the critical and untrusted networks. Continuous connections monitoring helps in keeping the organization’s exposure at minimum.
Read more on our website 👇
bit.ly/sensorfleet-di…
Do you know how to monitor the “dark” corners of your networks? Integrated and centralized IDS’s are definitely recommended. But how to get a second line of defence?
We’ll tell you more in our use case👇
bit.ly/sensorfleet-de…
Isolated networks are not always as well isolated as you would think. That’s why testing network isolation is a fundamental security control. Automated audit solution covers multiple and diverse points of failure. Read our newest use case to learn more 👇
sensorfleet.com/use-cases/moni…
Lately, Zeek has been gaining more and more traction: it is now a component of Microsoft Windows and Defender for Endpoint. We developed support to run Zeek in a cluster mode for high bandwidth requirements. Read more 👇
sensorfleet.com/2022/10/27/clu…
In every organization, there is confidential information that needs to be kept safe. Canary tokens are an effective way to do lightweight intrusion detection.
In our use case we’ll tell you more how canary tokens can help you trip attackers ⬇️
sensorfleet.com/use-cases/cana…
Full packet captures are an invaluable source of information for incident investigation, but rarely available. How would we solve this problem? Read more ⬇️
sensorfleet.com/use-cases/anal…
Antti Tönkyrä on the stage at #Prevent23!
💡 Organizations should consider a model where multiple different #NDR solutions build a "NDR Stack" where you can mix and match different capabilities while also keeping the toolset somewhat standardized.
#CyberSecurity
Antti Tönkyrä jakaa videolla ajatuksia ja kokemuksia verkon valvonnasta monitoimittajaympäristössä.
Antti Tönkyrä sharing thoughts, experiences, and considerations of network based cyber detection and response. In Finnish only.
#Prevent23
youtube.com/watch?v=xRqc2R…