By Ben Reardon
The threat actors who created SUNBURST went to extraordinary lengths to hide Command-and-Control (C2) traffic by mimicking the nature of communication patterns used by legitimate software within the SolarWinds package. The contents of the C2 communications are ... Read more »
February 2020
Info Security Products Guide Global Excellence - Gold
Network Visibility, Security & Testing
Cybersecurity Excellence Award Gold
Network Traffic Analysis
Cyber Defense Magazine Cutting Edge Award
Network Security and Management
CRN
Channel Chiefs 2020 - Scott Hoard
March 2019
Business Insider
Top 19 Open Source Software Startups to Watch
Cybersecurity Excellence Award Silver