FireEye, Inc. | Four Things to Consider When Building a Network Forensics Storage Architecture

The Right Data at the Right Time

Giving security professionals the network traffic data they need to assess the extent of a breach when they need it and in a usable format can help target and accelerate response. Unfortunately, many organizations don’t have an efficient network-forensics storage solution in place to provide that data.

This paper focuses on how to build and maintain that solution, and it provides best practices for storing and retaining network forensics data as well as the pitfalls to avoid.

Learn why it’s important for you to:

  • Maintain visibility across the entire attack lifecycle with metadata and full packet capture
  • Identify the most valuable data sources and which activity should be monitored
  • Determine the type of storage that should be used
  • Consider storage licensing costs, system compatibility, additional storage needs, and data retention concerns

Download the paper now.

Four Things to Consider When Building a Network Forensics Storage Architecture

Download the Whitepaper

© 2017 FireEye, Inc. All rights reserved. Privacy Policy. FireEye on Facebook    FireEye on Twitter    FireEye on LinkedIn    FireEye Blog: Malware Intelligence Lab