weapons in your security assessment arsenal · the active phase is the gaping hole in enterprise...
TRANSCRIPT
![Page 1: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/1.jpg)
© Vectra Networks | www.vectranetworks.com
Weapons in Your Security Assessment Arsenal
Jared Hufferd, Security Evangelist, Vectra Networks
Professional Techniques – T13
![Page 2: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/2.jpg)
© Vectra Networks | www.vectranetworks.com11/9/2015 2
CRISC
CGEIT
CISM
CISA2013 Fall Conference – “Sail to Success”
ADDING TO THE STACK
2
![Page 3: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/3.jpg)
© Vectra Networks | www.vectranetworks.com
Security Assessment Stack – What Could Happen
3
Penetration Testing
Vulnerability Assessment
Network Assessment
![Page 4: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/4.jpg)
© Vectra Networks | www.vectranetworks.com
Add Real-time Breach Assessment – What IS Happening
4
Breach Assessment
Penetration Testing
Vulnerability Assessment
Network Assessment
![Page 5: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/5.jpg)
© Vectra Networks | www.vectranetworks.com
Real-time Breach Assessment Components – What IS Happening
5
Score & Report
Correlate Behaviors to Host
Algorithmic Behavior Analysis
Baseline Common Behaviors
![Page 6: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/6.jpg)
© Vectra Networks | www.vectranetworks.com11/9/2015 6
CRISC
CGEIT
CISM
CISA2013 Fall Conference – “Sail to Success”
WHY THIS NEW ADDITION TO THE ASSESSMENT STACK?
6
![Page 7: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/7.jpg)
© Vectra Networks | www.vectranetworks.com
Cyber Attacks Follow the Same Blueprint
2007
• TJX Breach – systemic,
massive financial impact
• Security: more prevention,
cleanup and forensics
2013
• Breaches become a
regular occurrence
• Security: evolving to a
proactive daily effort to
find active breaches
2000
• Breaches are relatively
simple (SQL Injection)
• Security: focus on
preventing exploits
They all had the latest prevention
![Page 8: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/8.jpg)
© Vectra Networks | www.vectranetworks.com 8
![Page 9: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/9.jpg)
© Vectra Networks | www.vectranetworks.com
Security investment has traditionally been in two areasS
ecurity
Investm
ent
& E
ffo
rt
High
Low
9
SIEM analysis and incident
response reconstructs the
active phase after the breach
Perimeter security looks
for exploits and malware
• Firewalls
• IPS
• Malware Sandboxes
Prevention Phase Clean-up Phase
![Page 10: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/10.jpg)
© Vectra Networks | www.vectranetworks.com
The active phase is the gaping hole in enterprise security
SIEM analysis and incident
response reconstructs the
active phase after the breach
Perimeter security looks
for exploits and malware
• Firewalls
• IPS
• Malware Sandboxes
Security
Investm
ent
& E
ffo
rt
High
Low
Enterprises are overly
dependent on blocking and
prevention mechanisms that
are decreasingly effective
against advanced attacks.1
1Designing an Adaptive Security Architecture for Protection from Advanced Attacks, 12 February 2014, ID G00259490
10
Prevention Phase Active Phase Clean-up Phase
205 Days Average
Assets found in the wild
![Page 11: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/11.jpg)
© Vectra Networks | www.vectranetworks.com
A closer look at the phases of modern cyber attacks
11
Internal
Recon
Lateral
Movement
Acquire
Data
Botnet
Monetization
Standard C&C
Exfiltrate
Data
Custom C&C
& RAT
Custom C&C
Initial
Infection
![Page 12: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/12.jpg)
© Vectra Networks | www.vectranetworks.com
Detects all phases of a cyber attack in progress
12
Internal
Recon
Lateral
Movement
Acquire
Data
Botnet
Monetization
Standard C&C
Exfiltrate
Data
Custom C&C
& RAT
Custom C&C
Initial
Infection
![Page 13: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/13.jpg)
© Vectra Networks | www.vectranetworks.com
Alignment to existing security solutions
13
Internal
Recon
Lateral
Movement
Acquire
Data
Botnet
Monetization
Standard C&C
Exfiltrate
Data
Custom C&C
& RAT
Custom C&C
Initial
Infection
Security Information Event Management
PAYLOAD ANALYSIS FORENSICS
EVENT & LOG MANAGEMENT
![Page 14: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/14.jpg)
© Vectra Networks | www.vectranetworks.com
Automatically detect breaches in real time
Automation
Continuous
Monitoring
Real-time
Detection
Immunize
the Herd
Prioritized
Contextual
Results
14
All packets
N-S, E-W traffic
Any OS, app, device
Meta data to cloud
Centralized learning
No required rules
Behavioral
Machine learning
Correlated over time
Prioritized by risk
Correlated by host
Insight into attack
![Page 15: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/15.jpg)
© Vectra Networks | www.vectranetworks.com
Sensor• Deployed at access switch/router
• Sees N-S Traffic
• Sees E-W Traffic within the switch
• Malware spreading, privilege
escalation, data theft
Brain • Deployed at core switch
• Sees N-S Traffic
• Sees E-W Traffic that crosses a switch
• Malware spreading, privilege
escalation, data theft
Full cyber security visibility - Watch all critical traffic
Perimeter devices
have N-S visibility only
Core Switch
AccessSwitch
Remote Site
15
Data Center
Internet
![Page 16: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/16.jpg)
© Vectra Networks | www.vectranetworks.com11/9/2015 16
CRISC
CGEIT
CISM
CISA2013 Fall Conference – “Sail to Success”
BEHAVIOR DETECTION TYPES
16
![Page 17: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/17.jpg)
© Vectra Networks | www.vectranetworks.com
The Good, The Bad, The Ugly & The Ugliest Behaviors
The Good• Legitimate applications run by authorized user/host behavior that acts like an infected host
• C&C – WebEx, GoToMyPC
• Scans/Scanners – Nessus, Qualys, VOIP PBX
• Exfiltration – Box.com, AWS
The Bad• Legitimate Applications with misconfigurations
• Brute force – Print server changed settings
• Scans/Scanners – Asynchronous traffic
The Ugly• Legitimate Applications run by unauthorized user/host behavior that acts like an infected host
• C&C – WebEx, GoToMyPC, Canvas, CoreImpact,
• Scans/Scanners – Nessus, NMAP
• Exfiltration – Box.com, AWS
The Ugliest• Botnets
• Pirate cloud – uses resources
• Spam – hurts reputation
• Password capture – See Fazio/Target
17
• Targeted Attacks• Stealing IP/CC/PII
• Damage - Corruption
• See SONY
Whitelist
Noise – Help Desk
What Could Happen
What is Happening
![Page 18: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/18.jpg)
© Vectra Networks | www.vectranetworks.com 18
![Page 19: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/19.jpg)
© Vectra Networks | www.vectranetworks.com 19
![Page 20: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/20.jpg)
© Vectra Networks | www.vectranetworks.com 20
![Page 21: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/21.jpg)
© Vectra Networks | www.vectranetworks.com 21
![Page 22: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/22.jpg)
© Vectra Networks | www.vectranetworks.com 22
![Page 23: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/23.jpg)
© Vectra Networks | www.vectranetworks.com 23
![Page 24: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/24.jpg)
© Vectra Networks | www.vectranetworks.com 24
![Page 25: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/25.jpg)
© Vectra Networks | www.vectranetworks.com 25
![Page 26: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/26.jpg)
© Vectra Networks | www.vectranetworks.com 26
![Page 27: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/27.jpg)
© Vectra Networks | www.vectranetworks.com 27
![Page 28: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/28.jpg)
© Vectra Networks | www.vectranetworks.com 28
![Page 29: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/29.jpg)
© Vectra Networks | www.vectranetworks.com 29
![Page 30: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/30.jpg)
© Vectra Networks | www.vectranetworks.com 30
![Page 31: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/31.jpg)
© Vectra Networks | www.vectranetworks.com 31
![Page 32: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/32.jpg)
© Vectra Networks | www.vectranetworks.com 32
![Page 33: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/33.jpg)
© Vectra Networks | www.vectranetworks.com 33
![Page 34: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/34.jpg)
© Vectra Networks | www.vectranetworks.com 34
![Page 35: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/35.jpg)
© Vectra Networks | www.vectranetworks.com 35
![Page 36: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/36.jpg)
© Vectra Networks | www.vectranetworks.com 36
![Page 37: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/37.jpg)
© Vectra Networks | www.vectranetworks.com 37
![Page 38: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/38.jpg)
© Vectra Networks | www.vectranetworks.com 38
![Page 39: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/39.jpg)
© Vectra Networks | www.vectranetworks.com 39
![Page 40: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/40.jpg)
© Vectra Networks | www.vectranetworks.com 40
![Page 41: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/41.jpg)
© Vectra Networks | www.vectranetworks.com 41
![Page 42: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/42.jpg)
© Vectra Networks | www.vectranetworks.com 42
![Page 43: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/43.jpg)
© Vectra Networks | www.vectranetworks.com 43
![Page 44: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/44.jpg)
© Vectra Networks | www.vectranetworks.com 44
![Page 45: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/45.jpg)
© Vectra Networks | www.vectranetworks.com 45
![Page 46: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/46.jpg)
© Vectra Networks | www.vectranetworks.com 46
![Page 47: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/47.jpg)
© Vectra Networks | www.vectranetworks.com 47
![Page 48: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/48.jpg)
© Vectra Networks | www.vectranetworks.com11/9/2015 48
CRISC
CGEIT
CISM
CISA2013 Fall Conference – “Sail to Success”
VECTRA
48
![Page 49: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/49.jpg)
© Vectra Networks | www.vectranetworks.com
Sample Vectra customers and vertical industries
49
8%4%
6%
16%
6%
12%6%6%
19%
17%
Education Energy
Entertainment Finance
Legal Health
S&L Gov't Media
Technology Other
![Page 50: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/50.jpg)
© Vectra Networks | www.vectranetworks.com
The team
50
Leadership
Customers
Alain MayerVP Product Mgmt
Cyphort, Redseal
Jason KehlVP Engineering
Juniper, Cisco, Ironport
Mike BanicVP Marketing
HP, Juniper, Peribit
Rick GeehanVP Americas Sales
Riverbed
Oliver
TavakoliCTO
Juniper, Funk
Hitesh ShethPresident & CEO
Aruba, Juniper, Cisco
Investors
Mission
Automatically detect ongoing cyber attacks in real time
Industry Recognition
8% 4% 6% 18% 6% 12% 6% 6% 19% 17%
Education Energy Entertainment Finance Legal Health S&L Govt Media Technology Other
Gerard BauerVP EMEA Sales
Riverbed
![Page 51: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/51.jpg)
© Vectra Networks | www.vectranetworks.com11/9/2015 51
CRISC
CGEIT
CISM
CISA2013 Fall Conference – “Sail to Success”
LIVE DETECTION REVIEW
51
![Page 52: Weapons in Your Security Assessment Arsenal · The active phase is the gaping hole in enterprise security SIEM analysis and incident response reconstructs the ... Automatically detect](https://reader034.vdocuments.mx/reader034/viewer/2022050608/5faeeb65a373a529de0a588e/html5/thumbnails/52.jpg)
© Vectra Networks | www.vectranetworks.com© Vectra Networks | www.vectranetworks.com