HUNT WITHOUT AN EXPERT

 

SURVEY

Enumerate the network to
survey endpoints

 

IDENTIFY

Malware and suspicious code that have breached existing defenses

 

VALIDATE

Endpoint state as 'Compromised' or 'Not Compromised' using collected forensics and dynamic threat scoring