Product Video

Faster Security Investigation & response demo

What do you do if you have just been advised that a vulnerability in Java is being exploited by attackers?

If a user clicks on a seemingly harmless email link, a Trojan is installed – providing the attacker with full access to that device and with the ability to move laterally across the network.

This video shows how, in less than 10 seconds, we can use Tachyon to:

  • Identify devices at risk,
  • Determine if machines are exploited, and
  • Block machines from communicating with the attacker.
Related Content

On-demand Webinar

Improving the Incident Response Function: SANS 2018 Incident Response Survey Results Part 2

Incident responders are catching and remediating threats faster than ever, according to past SANS surveys. Much of their success can be attributed to improving technologies, such as threat intelligence--73 percent of respondents to last year's survey said they were using…

On-demand Webinar

How Are You Responding to Threats: SANS 2018 Incident Response Survey Results Part 1

What new and continuing threats are responders uncovering in investigations, and how are they dealing with those threats? This webcast will release results from the SANS 2018 Incident Response Survey, developed by Matt Bromiley, SANS Digital Forensics and Incident Response…

Share this post

Share this post on your favourite social media platform.

Find this resource useful?

If so please click here

About 1E

Cyber security is critical. One breach could destroy your organization’s reputation and cost millions of dollars. We take that threat seriously. 1E gives you unprecedented control and visibility over your full digital estate, delivered at speed and at scale. We’re working towards a world of proactive cyber security, a world where CIOs and CISOs work together to ensure that no threat can bring down their systems.