About Lesson
Containment and Mitigation Tools
These tools are used to contain threats and prevent further damage during an incident.
Firewall and Network Segmentation:
- Blocks malicious traffic and isolates affected systems.
- Examples: Palo Alto Networks, Check Point.
Sandboxing Solutions:
- Analyzes potentially malicious files in an isolated environment.
- Examples: FireEye, Cuckoo Sandbox.
Email Filtering and Anti-Spam Tools:
- Blocks phishing attempts and malicious email attachments.
- Examples: Proofpoint, Barracuda.