Collective Detection of Harmful Requests

Provided by:
Topic: Security
Format: Webcast
Typical signature-based methods rely on expert knowledge and the distribution of updated information to the clients, offering limited protection against newest threats. In this webcast, the presenter will aim at identifying typical and unusual behavior patterns and unusual requests.

Find By Topic