![](https://www.thatdot.com/wp-content/uploads/2024/06/image-65-600x298.png)
Network Log Analysis Using Categorical Anomaly Detection
The distributed nature of modern virtualized software architectures has created added complexity in the networking stack, making it difficult to attribute behavior to any single service.
The distributed nature of modern virtualized software architectures has created added complexity in the networking stack, making it difficult to attribute behavior to any single service.
Traditionally, monitoring alerts are produced comparing metrics against thresholds to identify behavior outside the norm.
As crypto currencies go mainstream, better techniques for protecting users from fraud are needed. Enter streaming graph.
Bringing cloud-based data management into the enterprise data center, where much enterprise data still lives, is now simpler than ever.
Advanced: Finding a malicious employee is one of the toughest cyber-security challenges in the industry.
This blog on AWS data exfiltration detection explains the use of categorical data in anomaly detection to identify multi-stage exploit campaigns in AWS CloudTrail logs.
Destructive attack campaigns succeed because they integrate new techniques or new hardcoded credentials to access and victimize their targets.
The move to the cloud represents new challenges for enterprise security teams. Use thatDot Novelty Detector to detect the attack quickly.