Insights from Mobile Network Traffic Data
I

Q: How do you monitor network traffic data at work and gather insights into malicious activities? Which tools do you prefer? What sets them apart from other tools?

Here are the answers from the SecPro community members on Insights from Mobile Network Traffic Data:

 
Choose the correct data source, pick the correct points on the network to monitor and check the flows and packet payloads for suspicious content. 
-Avishek, Data Scientist 
 

To analyse network traffic I leverage both on network taps and span port to forward sniffed traffic to an NDR and ingest NetFlows in a SIEM. 
The first allows for a near real time detection of suspicious activities and supports also network forensic, while the second has the capability to correlate NetFlow information with security events and logs datalake, enabling for deep insights into ongoing activities in the network. 
-Luca, Security Solutions and Operations 
 
 
We have a network monitoring tool and we monitor device, user and location attributes are collected and we have a machine learning model that helps track unusual activities and behavior that requires investigation as part of zero trust policy. 

-Shiva, Director of Security Operations 

The SecPro is a weekly security newsletter to help you stay sharp and upgrade your skills with trending threat insights, practical tutorials, hands-on labs, and useful resources. Build skills in as little as 10 minutes. Join the newsletter here.

Stay up to date with the latest threats

Our newsletter is packed with analysis of trending threats and attacks, practical tutorials, hands-on labs, and actionable content. No spam. No jibber jabber.