Finding Incidents Using Web Filtering Data
Title: Finding Incidents Using Web Filtering Data
Presenters: Tim Wenzlau, Product Manager, Mike Reynolds, Product Marketing Manager
Date: March 05, 2020
Web filtering data can be a treasure trove of threat activity (PUPs/PUAs). The challenges with finding these threats come from the vast volume of sensor data. PUP malware beaconing signals may or may not occur at regular intervals and a human security analyst can't be expected to keep track of all the web requests generated by a single host for an hour, let alone a day or a week. The solution to this challenge is Robotic Decision Automation, which can consider over 60 factors specific to web filtering data when identifying malware and other malicious activity.
Key takeaways from this webinar:
- Web filter data volume is no longer an issue for monitoring
- Monitoring HTTPS traffic reduces Mean Time to Respond (MTTR)
- The Respond Analyst is the first solutions that allows for real-time analysis and triage of web proxy data
The Respond Analyst integrates with leading web proxy vendors: Palo Alto Networks, Symantec, McAfee, Cisco, Forcepoint, Carbon Black and ZScaler.