Category: Network Security

Internet Threat Protection (ITP)

Internet Threat Protection is a key Banyan feature that allows us to evaluate which URLs (being searched by end ...

Intrusion Detection System (IDS)

A security system that monitors network traffic for suspicious or malicious activities and alerts administrators ...

Intrusion Prevention System (IPS)

A security system that goes beyond detection and actively blocks or prevents malicious activities from occurring ...

Kubernetes

An open-source container orchestration platform used to automate the deployment, scaling, and management of ...

Lag

Delay or latency experienced during a remote desktop session, often caused by network issues or high resource ...

Lazarus

Overview: Lazarus, also grouped with Andariel, APT37, APT38, and Kimsuky. Suspected Attribution: North Korean ...

Live Forensics

The collection and analysis of digital evidence from systems or devices while they are still running, without ...

Log Analysis

The examination of log files and event records from various sources, such as operating systems, applications, and ...

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to systems or data. Examples include ...

Malware Analysis

The examination and study of malicious software to understand its behavior, capabilities, and potential impact on ...

Malware Protection

Technologies and mechanisms implemented in SWGs to detect, block, and prevent the delivery or execution of ...

Man in the Middle (MitM) Attack

A type of cyber attack where the attacker secretly relays and possibly alters the communications between two ...