Blog Author Icon

Detecting Application Tunneling with Stealthwatch

/
Blog Post Detecting Application Tunneling with Stealthwatch David Salter Jul 13, 2017 This use case aims to detect covert communication channels where commonly used legitimate TCP and UDP ports are being used to attempt to hide... Read more > stealthwatch, Threat Detection ... Read More
Blog Author Icon

Monitoring Trusted Third Parties with Stealthwatch

/
Blog Post Monitoring Trusted Third Parties with Stealthwatch David Salter Jun 15, 2017 It’s important to monitor trusted third parties with corporate network access to ensure they are not exposing the company to risk. Using Stealthwatch... Read more > stealthwatch, Threat Detection, policy violation ... Read More
Blog Author Icon

Who is NOT Using the Web Proxy?

/
Blog Post Who is NOT Using the Web Proxy? David Salter May 04, 2017 Web proxies are implemented to monitor web traffic between users and the Internet. They are used primarily for: Malware detection Corporate policy... Read more > stealthwatch ... Read More
Blog Author Icon

What Traffic do I Have in my Branch Network?

/
Blog Post What Traffic do I Have in my Branch Network? David Salter Apr 06, 2017 In recent years, the branch office evolution has resulted in organizations shifting from offering basic services over expensive leased circuits to... Read more > stealthwatch, Branch network ... Read More