"You need continuous recording – almost like a virtual CCTV camera – on every enterprise endpoint, to spot in real time things like file modifications and other unusual activity which can be the tell-tale signs of an attack. After that it's about putting in place the means to isolate, stop and remediate. The sooner you spot an attack the better the chance it hasn't had time to find its way to sensitive data. Even if attackers have begun to hide their activity, you'll have always-on recording to track the kill chain of what actions have been executed and what data has been exfiltrated."
a new layer infront of the networks alerts companies to any attack and can deal with it before it penetrates through.
IWG Price at posting:
33.0¢ Sentiment: Buy Disclosure: Held