Blog Author Icon

Detecting Application Tunneling with Stealthwatch

|
Blog Post Detecting Application Tunneling with Stealthwatch David Salter Jul 13, 2017 This use case aims to detect covert communication channels where commonly used legitimate TCP and UDP ports are being used to attempt to hide... Read more > stealthwatch, Threat Detection ... Read More
Blog Author Icon

Monitoring Trusted Third Parties with Stealthwatch

|
Blog Post Monitoring Trusted Third Parties with Stealthwatch David Salter Jun 15, 2017 It’s important to monitor trusted third parties with corporate network access to ensure they are not exposing the company to risk. Using Stealthwatch... Read more > stealthwatch, Threat Detection, policy violation ... Read More