Download now Free registration required
A security breach has just occurred on corporate network. It could be a virus or worm that is spreading quickly; it could be an unauthorized wireless access point that was just plugged into the network; it could be an insider logging into the corporate mainframe and stealing intellectual property. The reality is that every Internet-connected network will come under attack eventually and, unless enterprise is extremely unusual, one of those attacks will eventually succeed. Okay, now what? How will network staff deal with these and other threats? This case study examines how one company used eTelemetry's Locate product to deal with three different security incidents that occurred during a single week.
- Format: PDF
- Size: 0 KB