Collective Detection of Harmful Requests

Typical signature-based methods rely on expert knowledge and the distribution of updated information to the clients, offering limited protection against newest threats. In this webcast, the presenter will aim at identifying typical and unusual behavior patterns and unusual requests.

Provided by: Topic: Security Date Added: May 2015 Format: Webcast

Find By Topic