This PoC begins by detailing BluVector’s core product – Advanced Threat Detection (ATD) and how it expands visibility in your network traffic analysis by providing more quality analytics. This is done with multiple Machine-Learning Engines (MLEs) correlating all network events with Speculative Code Execution Engines (SCEs), probability & analytics engines, and other asset illuminators to prioritize threat notifications at line speed.
We then take the viewer on a journey into our newest product – Automated Threat Hunting (ATH) and how it can be used to correlate the threat landscape across your cloud and on-premise infrastructure. It produces and tracks the risk associated with all the entities that it identifies and enumerates in your network – and present and correlate adversarial campaigns across these entities. This specific portion of the PoC is from a real exercise that was conducted at the National Cyber Range and how ATH was able to put together a story around a Red Team attack, thus correlating the what, when, and how the system, entities, users, and other objects were attacked.
Register now and receive exclusive access to ONUG content and updates
Register Here