packetloop.com
blog.packetloop.com

Packetloop's Threat Analysis feature allows you to step through attacks play by play to accurately confirm indicators of compromise with real evidence. This screencast follows on from my last post "From Indicators of Compromise to Smoking Guns".

As you can see security analysts have the ability to identify and undersand attacks incredibly fast. They can visualize the entire attack timeline and walk through every packet step by step. Using the Advanced Filter they can quickly identify who the source of attack is, how the breach took place, how long the attacker was inside the network and what systems were affected and what information was accessed or stolen.

Loading more stuff…

Hmm…it looks like things are taking a while to load. Try again?

Loading videos…