
Malware identification
Prior to effectively combating a malware attack or outbreak the specific behaviour characteristics and Indicators of Compromise (IOCs) of the malware need to be known. These IOCs will vary between different malware sources and can include unusual network traffic, registry entries, powershell execution and local file creation.
NGTS can assist in identifying the behaviour characteristics of a malware source to enable the effective disruption of the malware and minimise any data loss or exfiltration.