From Our Blog

Mail impersonation - Mail phishing recognize

Mail impersonation - Mail phishing recognize

The security threat: Mail impersonation is one of the most popular and successful attacks today. This kind of attack can…
Rules based on aggregate SUM

Rules based on aggregate SUM

Use case Example: We want to monitor in Real-time if a user sends in the last 24 Hours more than…
Contain from Active List

Contain from Active List

Have you ever wanted to create a rule that has the ‘Contain From Active List’ condition in ArcSight? Before starting…