Loading…
Wednesday, April 13 • 15:50 - 16:30
How to leverage agentless endpoint analysis to perform detection of breaches

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

By harnessing the cloud and the ability to constantly update threat data, new products are able to constantly asses endpoints to determine whether they have been compromised. Further the cloud can allow for quick and painless binary analysis in instances which malware is detected. In addition these new SAS technologies allow for foot printing of user behavior across a broad range of endpoints, allowing for the identification of anomalous user behaviors.

Speakers

Wednesday April 13, 2016 15:50 - 16:30 CEST
Ceremony