Endpoint node attackIn the field of information security, no one will be surprised when an attacker gets into the local network of the company and gains
access (or even
root access) to some device within it. Such cases can be very costly to the company. Even more, if an attacker continues invasion by infecting other devices in the network this can lead to critical consequences.
The recommended sequence of actions in such a case:
- Detect invasion
- Isolate infected node
- Collect the important data from the affected device and remove malware/spyware software
- Analyze the incident
DPI system helps to detect and prevent further spreading of infection (or evil activity) inside the local network. In addition to that, it provides valuable log information for the incident analysis.