Remove Airlines Remove Port Remove Server
article thumbnail

How Kentik reduces the likelihood of a full-blown cyber-attack before it happens

Kentik

One way we do this is by enriching flow records with data from threat intelligence feeds, identifying threats such as botnet command and control servers, malware distribution points, phishing websites, and spam sources. Well, if you see SSH connections over port 22 still happening, it is worth investigating.