Forum Discussion
precedent
Jul 09, 2019Copper Contributor
ATA considered a HIDS or NIDS or something else?
Like the subject says.
Is Advanced Threat Analytics considered a HIDS or NIDS or something else?
And why.
precedent ATA is an abnormal behavior detection product. UEBA
ATA technology detects multiple suspicious activities, focusing on several phases of the cyber-attack kill chain including:
- Reconnaissance, during which attackers gather information on how the environment is built, what the different assets are, and which entities exist. Typically, this is where attackers build plans for their next phases of attack.
- Lateral movement cycle, during which an attacker invests time and effort in spreading their attack surface inside your network.
- Domain dominance (persistence), during which an attacker captures the information that allows them to resume their campaign using various sets of entry points, credentials, and techniques.
You can find more information here.
- BrandonLawsonMicrosoft
precedent ATA is an abnormal behavior detection product. UEBA
ATA technology detects multiple suspicious activities, focusing on several phases of the cyber-attack kill chain including:
- Reconnaissance, during which attackers gather information on how the environment is built, what the different assets are, and which entities exist. Typically, this is where attackers build plans for their next phases of attack.
- Lateral movement cycle, during which an attacker invests time and effort in spreading their attack surface inside your network.
- Domain dominance (persistence), during which an attacker captures the information that allows them to resume their campaign using various sets of entry points, credentials, and techniques.
You can find more information here.