Network Forensics & Security Analytics

15 Entries
 
 
one month ago
Be the first person to recommend this.
Attachments
11 months ago
Be the first person to recommend this.

File extractions are a valuable part of a forensic investigation. In Security Analytics, these extractions are the reconstruction of files found within the payload of packets captured ...

11 months ago
Be the first person to recommend this.

A logical first step when looking for a suspected event In Security Analytics is using the Timespan filtering capability. The reason for this is that by reducing searches down to a ...

11 months ago
Be the first person to recommend this.

The new dark theme option supports SOC teams’ preferences and enables more comfortable, extended viewing time. Viewing a bright white screen in a dark room for multiple hours isn’t ...

11 months ago
Be the first person to recommend this.

Security Analytics now supports ICDx to open up integrations with a multitude of tools and threat data, including SIEMS (Security Information and Event Monitoring) solutions, orchestration, ...

11 months ago
Be the first person to recommend this.

Dynamically scale storage and expand as needed. You can start with a smaller deployment and grow when needed. The “Expand Storage utility” (available through Symantec Support) makes ...

11 months ago
Be the first person to recommend this.

With Session View, Incident Responders can quickly get all details of network flows and narrow their investigation focus before retrieving artifacts, greatly improving the efficiency ...

11 months ago
Be the first person to recommend this.

Symantec Security Analytics (SA) 8.1 is now available, adding new capabilities to Symantec’s powerful network traffic analysis and forensics solution. Enhancements include: added support ...

11 months ago
Be the first person to recommend this.

To help conserve valuable storage space in Security Analytics, the new 8.1 feature, Intelligent Capture, allows you to discard packets you don’t want to retain, but you still want indexed ...

one year ago
Be the first person to recommend this.

Security Analytics systems are constantly monitoring for possible hardware problems. There is a daemon which provides an interface between the software side of the application and the ...