Media coverage

Vectra report reveals what attackers do once they bypass perimeter defenses

Sorry, this post has not been published yet, check again later!

November 5, 2014
Published by:

InfoTech

This is the first report, using real-world data from the Vectra X-series platforms currently in production networks, that reveals what attackers do within a network once they evade perimeter defenses.

Read publication

Most recent media coverage

Government to tackle IoT security

November 19, 2019

Information Age

Read more

Government releases first Australian IoT code of practice

November 19, 2019

Which-50

Read more

As government reins in IoT security, recalcitrant mining industry is exposed

November 19, 2019

CSO

Read more