Detecting APT Activity with Network Traffic Analysis

Detecting APT Activity with Network Traffic Analysis
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.
Download Whitepaper
Related Whitepapers
Thanks for downloading Detecting APT Activity with Network Traffic Analysis. Here are some other white papers that we feel may be of interest to you given your recent download:
  • Managed security services is a mature market with offerings from established service providers. This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements. Download whitepaper »

  • This IDC study represents a vendor assessment of providers offering managed security services (MSS) through the IDC MarketScape model. The assessment reviews both quantitative and qualitative characteristics that define current market demands and expected buyer needs for MSS. The evaluation is based on a comprehensive and rigorous framework that assesses how each vendor stacks up to one another, and the framework highlights the key factors that are expected to be the most significant for achieving success in the MSS market over the short term and the long term. Download whitepaper »

  • CIO Australia’s Custom Research Group asked more than 100 CIOs, IT, network and infrastructure managers, and chief data and security officers about how they are dealing with the data deluge. These findings look at the growth and challenges for organisations tapping into information, what’s stalling good data management; and statistics on spending, efficiency and ownership. Download whitepaper »