How to use correlation rules for effective threat detection

Hosted By
IT users and M.

Details
The importance of correlating events from across the network.How correlation rules work under the hood.Differences between prebuilt and custom correlation rules.Why do you need custom correlation rules?Three use cases and real life examples of threat detection with event correlation.Using correlation rules in Log360 for effective defence.

Orlando Cybersecurity Meetup
See more events
Online event
This event has passed
How to use correlation rules for effective threat detection