Product Demo

How to Perform a Forensic Analysis After a Security Breach

In this Kentik demo, Phil Gervasi shows how to perform a network forensic analysis after a security breach. Using Kentik’s robust visibility into public cloud traffic, we showcase how engineers can effectively identify, analyze, and respond to security incidents. Through a hypothetical scenario, we trace a security alert from its origin — a suspected attack on an Azure-hosted system — to its resolution.

Using tools like the Kentik Map and Data Explorer, we identify the attacker’s entry point, compromised internal devices, and potential data exfiltration activities. By the end, we highlight the critical importance of visibility in cybersecurity and discuss potential remediation measures, emphasizing Kentik’s unparalleled capabilities in network observability.

Learn more about how Kentik can fortify your network security posture.

We use cookies to deliver our services.
By using our website, you agree to the use of cookies as described in our Privacy Policy.