Threats

In the ti_icon Threats menu, you can see charts of the security incidents logged in your network, view incident logs and search the intelligence database of Threat Defender.

Threat Defender integrates a continuously active threats subsystem that is designed to handle an optimized data structure and therefore causes no performance losses. It provides a bundle of feeds from multiple sources. These feeds contain various types of data, such as information on downloads of ransomware, C&C server domains and so on.

Threat Defender compares all network traffic flows to these feeds in real time. If a threat indicator is discovered, the policy engine can be used to log the event and/or intercept the concerned traffic.