• RSS
  • Twitter
  • FaceBook
Home > White Papers > AlienVault > How to Detect System Compromise and Data Exfiltration

How to Detect System Compromise and Data Exfiltration

AlienVault

Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage.
You'll learn:

  • How attackers exploit vulnerabilities to take control of systems
  • What they do next to find & exfiltrate valuable data
  • How to catch them before the damage is done with AlienVault USM

Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.

Email this page
Published:  Oct 21, 2014
Type:  Webinar
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit



Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter