• v7.1.1
    • v7.11.0 (latest)
    • v7.10.0
    • v7.9.0
    • v7.8.0
    • v7.7.0
    • v7.6.0
    • v7.5.0
    • v7.3.0
    • v7.2.0
    • v7.1.1
    • v7.1.0
    • v7.0.8
  • Services & Support
  • Devo.com
  • Contact
    • Contact Us
    • Request a Demo
    • Partner Inquiry
  • Log In
    • USA Devo
    • EU Devo
PREVIOUS
Threat Hunting
NEXT
Phishing attack

Applications / Devo Security Operations / Use cases

Download as PDF

Use cases

In this section, you will find practical examples that will help you identify different aspects of the Security Operations application, as well as give you some hints on how to proceed when facing situations that might require a similar approach to be solved.

  • Phishing attack
  • Command & Control
  • Alerting system status

Download as PDF

PREVIOUS
Threat Hunting
NEXT
Phishing attack

Export

See what Devo can do for you. Request a demo!
Discover what's new (Release notes)
  • v7.1.1
    • v7.11.0 (latest)
    • v7.10.0
    • v7.9.0
    • v7.8.0
    • v7.7.0
    • v7.6.0
    • v7.5.0
    • v7.3.0
    • v7.2.0
    • v7.1.1
    • v7.1.0
    • v7.0.8
  • Services & Support
  • Devo.com
  • Contact
    • Contact Us
    • Request a Demo
    • Partner Inquiry
  • Log In
    • USA Devo
    • EU Devo
  • +1 888 6830910 (USA)
  • +34 900 838 880 (Spain)
Copyright © 2019 Legal Terms Privacy Policy Cookies Policy

Powered by Confluence and Scroll Viewport