This is the final article in a three-part series on Network Baselining. Read the first two articles in the series here:
1) An Introduction to Baselining Technology
2) How to Create a Baseline for Your Network
In October, 2019 a MixMode customer experienced an incident where an external entity attacked a web server located in their DMZ, compromised it, and then pivoted internally through the DMZ to attempt access of a customer database. While the attacker was successful in penetrating the customer’s network, MixMode was able to detect the event before they were successful in penetrating the customer database.
“The biggest misconception people have about endpoints is that they have an idea of what their endpoints really are. The security industry has rightly taught defense-in-depth & blocking. However, too many companies rely solely on that concept, and aren’t prepared for what happens when something is breached. That breach, when it happens, will take place …