article thumbnail

Q&A: How emulating attacks in a live environment can more pervasively protect complex networks

The Last Watchdog

We have customers within the financial services vertical that do this on a regular basis. We’ve set up honeypots around the world, which we use to harvest and categorize malware. It helps them to decide how to configure a device before pushing it out into their live network or production network.