Overview: Capsule8's Attack Detection Methods
The Capsule8 Platform proactively detects Indicators of Attack (IoA) across your entire Linux production environment, pointing you to the true attacks that require attention. The ability to detect live exploitations (IoA) allows you to address security incidents quickly, versus looking for Indicators of Compromise (IoC) which implies awareness only after an attacker has taken hold of your environment.
Download this datasheet to learn:
- Capsule8's design philosophy fro detection methods on Capsule8 Protect
- The differences between kernel-level, userland, file system, and network detection methods
- The Capsule8 vision beyond detection