Evasion
Download the Solution Brief
After compromising a user or asset, adversaries use a host of evasion tactics to remain undetected. They use this time to perform additional malicious activity such as deploying malware for exfiltrating data, encrypting files for ransomware, or exploiting resources for cryptomining. The faster an organisation can identify an adversary, the more they can reduce the costs of an estimated breach. Recent research estimates organisations can save $1.12 million on average if a breach is detected within 200 days.
Exabeam detects anomalous activity associated with evasion, such as tampering with audit logs, file destruction or encryption, and the use of a tor proxy to hide web activity.
Simply enter a few details to download the full solution brief!