How does an organization gain visibility into attacker behaviors that occur inside cloud environments?
Virtualized cloud environments pose a formidable challenge when it comes to observing attacker behaviors. Traditional detection and response methods designed for physical network environments can’t reveal attackers in virtualized environments.
In this session, we will discuss various methods of data collection that provide visibility into attacker behaviors between cloud workloads and explain the different levels of insight they can deliver.
- Learn the limitations of existing threat detection and response techniques.
- Understand the different methods of data collection in the cloud for threat detection and response
- Discover how to gain visibility into attacker behaviors that occur inside cloud environments.