Threat Detected, What Next?

Image showing Signals page with detection name as Brute Force attack
Signal
Image with Lookup panel showing location of suspected source as Nigeria
Lookup Panel
Image showing workbook with Time Travel, to know the logic of the detection that triggered the signal
Workbook query
Image showing 3 successful login from suspected source IP
Juste Login
Image showing Authentication Logs used to figure our location of suspected source IP as UK
Juste login details

--

--

The “Open” Big Data Analytics platform that offers solutions to the world’s most challenging cyber security problems with real-time data analytics.

Love podcasts or audiobooks? Learn on the go with our new app.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
DNIF

DNIF

22 Followers

The “Open” Big Data Analytics platform that offers solutions to the world’s most challenging cyber security problems with real-time data analytics.