163
views
views
Once the AI takes action it forwards its report to our Security Operations Specialist.
Once the AI takes action it forwards its report to our Security Operations Specialist reviews its findings and decides the next steps, which can range from allowing the traffic, to quarantining the machine to prevent further damage to attacking the cybercriminals with counter-offensive strategies like honey potting (that is, setting a trap for the criminal.)