How We Collect Data
- Endpoints - Packets, Logs, System State Changes, AV, Patch, DLP and Encryption Information
- Security Appliances - Logs, Packets, API Calls
- Networks: Scan configurations, Netflow, Syslog, Packet Capture, Perform AAA.
- Cloud Systems: Collect data from hosted systems, API calls to Cloud Vendors
What's the difference? Logging all data with an elite team reviewing patterns helps identify threats and close security holes left by configuration, malware or new vulnerabilities. Want to see what this data can tell you in your environment just click: