Network Forensics & Security Analytics

 View Only
16 Entries
 
 
one year ago
Be the first person to recommend this.
Attachments
3 years ago
Be the first person to recommend this.
Attachments
4 years ago
Be the first person to recommend this.

File extractions are a valuable part of a forensic investigation. In Security Analytics, these extractions are the reconstruction of files found within the payload of packets captured ...

4 years ago
Be the first person to recommend this.

A logical first step when looking for a suspected event In Security Analytics is using the Timespan filtering capability. The reason for this is that by reducing searches down to a ...

4 years ago
Be the first person to recommend this.

The new dark theme option supports SOC teams’ preferences and enables more comfortable, extended viewing time. Viewing a bright white screen in a dark room for multiple hours isn’t ...

4 years ago
Be the first person to recommend this.

Security Analytics now supports ICDx to open up integrations with a multitude of tools and threat data, including SIEMS (Security Information and Event Monitoring) solutions, orchestration, ...

4 years ago
Be the first person to recommend this.

Dynamically scale storage and expand as needed. You can start with a smaller deployment and grow when needed. The “Expand Storage utility” (available through Symantec Support) makes ...

4 years ago
Be the first person to recommend this.

With Session View, Incident Responders can quickly get all details of network flows and narrow their investigation focus before retrieving artifacts, greatly improving the efficiency ...

4 years ago
Be the first person to recommend this.

Symantec Security Analytics (SA) 8.1 is now available, adding new capabilities to Symantec’s powerful network traffic analysis and forensics solution. Enhancements include: added support ...

4 years ago
Be the first person to recommend this.

To help conserve valuable storage space in Security Analytics, the new 8.1 feature, Intelligent Capture, allows you to discard packets you don’t want to retain, but you still want indexed ...