Collective Detection of Harmful Requests

Watch Now
Provided by:
Topic: Security
Format: Webcast
Typical signature-based methods rely on expert knowledge and the distribution of updated information to the clients, offering limited protection against newest threats. In this webcast, the presenter will aim at identifying typical and unusual behavior patterns and unusual requests.
Watch Now

Find By Topic