{"id":9401,"date":"2022-10-04T10:21:42","date_gmt":"2022-10-04T08:21:42","guid":{"rendered":"https:\/\/www.kappadata.nl\/?page_id=9401"},"modified":"2023-04-28T16:15:04","modified_gmt":"2023-04-28T14:15:04","slug":"threat-hunting","status":"publish","type":"page","link":"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/threat-hunting\/","title":{"rendered":"Threat Hunting"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; css=&#8221;.vc_custom_1610556427925{background-image: url(https:\/\/www.kappadata.be\/wp-content\/uploads\/2020\/10\/Kappa-Data-Header-2.jpg?id=1191) !important;}&#8221; z_index=&#8221;&#8221;][vc_column][qode_elements_holder number_of_columns=&#8221;one_column&#8221;][qode_elements_holder_item advanced_animations=&#8221;no&#8221; item_padding=&#8221;5% 10% 10% 10%&#8221;][vc_column_text]<\/p>\n<h1>Threat Hunting<\/h1>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h3><span style=\"color: #ffffff;\">When an AI-based antivirus is no longer sufficient&#8230;<\/span><\/h3>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;80px&#8221; el_class=&#8221;onlyphone&#8221;][\/qode_elements_holder_item][\/qode_elements_holder][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; background_color=&#8221;#f3f3f3&#8243; padding_top=&#8221;20&#8243;][vc_column css=&#8221;.vc_custom_1604415412261{margin-top: -100px !important;}&#8221;][qode_elements_holder number_of_columns=&#8221;one_column&#8221;][qode_elements_holder_item horizontal_alignment=&#8221;left&#8221; advanced_animations=&#8221;no&#8221; custom_class=&#8221;cardstatic&#8221; background_color=&#8221;#ffffff&#8221; item_padding=&#8221;5% 10% 5% 10%&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]<\/p>\n<h2>Threat Hunting?<\/h2>\n<p>[\/vc_column_text][vc_column_text]Fortunately, at the time of writing, we cannot yet speak of war in our country. Or can we? That depends on your definition of &#8220;war.&#8221; Even within our region, companies are under constant attack. Hackers from all over the world have free access to not only our <strong>public IP addresses<\/strong>, but they can also send mail to any of us. You don&#8217;t even have to distinguish between personal or business related mails.<\/p>\n<p>The intention of these hackers is usually to make money, but sometimes there is also a political motive behind it. It is very difficult to find this out, let alone prove it. The type of company and the consequences can raise some suspicions though.<\/p>\n<p><strong>Regardless of what they have in mind, the consequences are rarely minuscule.\u00a0\u00a0<\/strong><\/p>\n<p>That is why we have all kinds of shields set up such as<strong> firewalls, email security and endpoint protection<\/strong>. The weakness of humans is exploited to gain themselves an access to the computer &#8211; with the network connected to it &#8211; through a backdoor. If you can&#8217;t count on the alertness of that user, how can you count on him or her to report his or her mis-click?<\/p>\n<p>What we are looking for is a kind of camera system that detects and records every movement in the network. By making correlations between different actions, suspicious patterns can be recognized.<\/p>\n<p><em><strong>Something more technical&#8230;\u00a0<\/strong><\/em><\/p>\n<p><strong>Mitre Att@ck<\/strong> is an American organization that closely monitors and maps the actions of hackers. An attack technique is a combination of various &#8211; in itself seemingly harmless &#8211; commands, most of which are also used by sysadmins.<\/p>\n<p>Before encrypting an entire network, hackers search their way around a network, map out where the backups are, which servers are important and so on. Between the initial contact and the effective encryption, days, weeks and sometimes months go by. The key is to detect the hacker before the encryption happens but also before he had a chance to upload data.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][vc_column_text]<\/p>\n<h4>EDR \/ XDR<\/h4>\n<p>The detection of these techniques, usually takes place in an <strong>EDR<\/strong> or <strong>XDR<\/strong> product. (Endpoint\/eXtended Detection and Response) This piece of software that is sometimes an extension of an existing endpoint protection or sometimes an entirely separate product, acts as a kind of probe that stores every activity in an <strong>on-computer<\/strong> and\/or <strong>cloud based database<\/strong>. The latter is usually called datalake. Depending on the product, you can<strong> immediately and automatically<\/strong> assign actions to certain triggers or you can program queries to generate alarms.<\/p>\n<p>When comparing these products you will see that some <strong>AI based endpoint protection software<\/strong> can block multiple actions even before EDR has had to catch them. When we talk about the term XDR, we see that the interpretation can also be different.[\/vc_column_text][vc_column_text]<\/p>\n<h4>Managed EDR<\/h4>\n<p>Suppose the system makes a detection that is almost certainly related to the presence of a hacker, then the desire is to <strong>remove this hacker from the network<\/strong>. The EDR tools will block the activity whether or not the hacker logs off, however, that does not guarantee that the hacker has not already installed loopholes. The hacker might have realized he was caught and accelerated the encryption process. Consequently, <strong>quick action<\/strong> in defense is appropriate. It is not obvious for everyone to free up the necessary resources at any time of the day or on weekends.<\/p>\n<p>The technical teams of the involved vendors are trained for this and are ready 24&#215;7 to carry out the effective countermeasures. We speak here of <strong>MDR, Guard<\/strong> or whatever the vendor wishes to use as a name for the service.[\/vc_column_text][\/qode_elements_holder_item][\/qode_elements_holder][vc_empty_space height=&#8221;25px&#8221;][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][qode_elements_holder number_of_columns=&#8221;one_column&#8221;][qode_elements_holder_item horizontal_alignment=&#8221;left&#8221; advanced_animations=&#8221;no&#8221; item_padding=&#8221;5% 10% 5% 10%&#8221; background_color=&#8221;#ffffff&#8221; custom_class=&#8221;cardstatic&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]<\/p>\n<h2><a href=\"https:\/\/www.kappadata.be\/en\/vendors\/sophos\">Sophos<\/a><\/h2>\n<p>[\/vc_column_text][vc_column_text]In 2015, Surfright &#8211; the company behind Hitman Pro &#8211; was acquired by Sophos. Soon Sophos emerged as one of the most progressive players in the endpoint protection market and excels in Gartner&#8217;s leaders quadrant. With the addition of XDR, you can start a scavenger hunt through the history of movements in the network. No hacker can stay under the radar. With the addition of MDR (Managed Detection and Response) Sophos keeps an eye on your network 24 x 7.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][\/qode_elements_holder_item][\/qode_elements_holder][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;75px&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; background_color=&#8221;#f3f3f3&#8243; padding_top=&#8221;75&#8243; css=&#8221;.vc_custom_1603192215592{background-color: #ffffff !important;}&#8221; padding_bottom=&#8221;75&#8243;][vc_column][vc_column_text]<\/p>\n<h2>Why choose Kappa Data?<\/h2>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_empty_space height=&#8221;30px&#8221; el_class=&#8221;onlyphone&#8221;][qode_elements_holder number_of_columns=&#8221;one_column&#8221;][qode_elements_holder_item horizontal_alignment=&#8221;left&#8221; advanced_animations=&#8221;no&#8221; item_padding=&#8221;5% 10% 5% 10%&#8221; background_color=&#8221;#f3f3f3&#8243; custom_class=&#8221;round&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]<\/p>\n<h3>Technical Expertise<\/h3>\n<p>Kappa data supports resellers and customers with extensive technical knowledge, training and guidance. Our certified technical and presales teams are always there for you![\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][\/qode_elements_holder_item][\/qode_elements_holder][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_empty_space height=&#8221;30px&#8221; el_class=&#8221;onlyphone&#8221;][qode_elements_holder number_of_columns=&#8221;one_column&#8221;][qode_elements_holder_item horizontal_alignment=&#8221;left&#8221; advanced_animations=&#8221;no&#8221; item_padding=&#8221;5% 10% 5% 10%&#8221; background_color=&#8221;#f3f3f3&#8243; custom_class=&#8221;round&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]<\/p>\n<h3>Personal touch<\/h3>\n<p>At Kappa Data, you will enjoy a particularly personal and professional approach, from quick quotes to demos and customer-friendly service with your regular contacts. We are there for you.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][\/qode_elements_holder_item][\/qode_elements_holder][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_empty_space height=&#8221;30px&#8221; el_class=&#8221;onlyphone&#8221;][qode_elements_holder number_of_columns=&#8221;one_column&#8221;][qode_elements_holder_item advanced_animations=&#8221;no&#8221; custom_class=&#8221;round&#8221; background_color=&#8221;#f3f3f3&#8243; item_padding=&#8221;5% 10% 5% 10%&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]<\/p>\n<h3>Excellent service<\/h3>\n<p>Kappa Data is a value-added distributor that thinks along with you in a solution-oriented manner. We always ensure a good relationship between all parties and mediate where necessary in case of conflicts.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][\/qode_elements_holder_item][\/qode_elements_holder][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;center&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; padding_top=&#8221;75&#8243; padding_bottom=&#8221;75&#8243; background_color=&#8221;#f3f3f3&#8243;][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h3>What our customers say<\/h3>\n<p>[\/vc_column_text][vc_column_text]A trusted partner for over 20 years<\/p>\n<p><span style=\"color: #c1d82f;\"><strong>Snijders Compuservice, Jef Snijders <\/strong><\/span>[\/vc_column_text][vc_empty_space height=&#8221;50px&#8221;]<a  itemprop=\"url\" href=\"#contact\" target=\"_self\"  class=\"qbutton  default\" style=\"\">Contact us!<\/a>[\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; padding_top=&#8221;50&#8243; padding_bottom=&#8221;20&#8243;][vc_column][vc_column_text]<\/p>\n<h3>Onze partners<\/h3>\n<p>[\/vc_column_text]<div class='projects_holder_outer v5 portfolio_with_space portfolio_with_hover_text'>\n        <div class='projects_holder portfolio_main_holder clearfix v5  hover_text portfolio_full_image '>\n        \n        <article class='mix portfolio_category_45 portfolio_category_100 portfolio_category_49 portfolio_category_57 portfolio_category_103 portfolio_category_63 portfolio_category_105 portfolio_category_99 default' style=''>\n    \n    \n    \n    \n            <div class=\"item_holder grayscale\">\n\n                    <div class=\"text_holder\">\n        <div class=\"text_holder_outer\">\n            <div class=\"text_holder_inner\">\n                                        <div class=\"icons_holder\">\n\n                                \n                                        <a itemprop=\"url\" class=\"preview\" title=\"Go to Project \" href=\"https:\/\/www.kappadata.nl\/en\/vendors\/sophos\/\" data-type=\"portfolio_list\" target=\"_self\" ><\/a>\n    \n                                <a data-type=\"icon\" href=\"#\" class=\"qode-like\" id=\"qode-like-2666\" title=\"Like this\" data-nonce=\"5a9e53498d\"><\/a>\n                            <\/div>\n                                    <\/div>\n        <\/div>\n    <\/div>\n\n                                    <a itemprop=\"url\" class=\"portfolio_link_class\" title=\"Sophos\" href=\"https:\/\/www.kappadata.nl\/en\/vendors\/sophos\/\"><\/a>\n                \n                <div style=\"background-color: rgba(255,255,255,0.25)\" class=\"portfolio_shader\"><\/div>\n                <div class=\"image_holder\">\n                    \n<span class='image'><img decoding=\"async\" width=\"960\" height=\"640\" src=\"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2020\/11\/Kappa-Data-Vendor-Sophos.png\" class=\"attachment-full size-full wp-post-image\" alt=\"Kappa Data - Vendor - Sophos\" srcset=\"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2020\/11\/Kappa-Data-Vendor-Sophos.png 960w, https:\/\/www.kappadata.nl\/wp-content\/uploads\/2020\/11\/Kappa-Data-Vendor-Sophos-300x200.png 300w, https:\/\/www.kappadata.nl\/wp-content\/uploads\/2020\/11\/Kappa-Data-Vendor-Sophos-768x512.png 768w, https:\/\/www.kappadata.nl\/wp-content\/uploads\/2020\/11\/Kappa-Data-Vendor-Sophos-700x467.png 700w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/span>                <\/div>\n            <\/div>\n\n        \n    \n<\/article>\n        <div class='filler'><\/div>\n            <div class='filler'><\/div>\n            <div class='filler'><\/div>\n            <div class='filler'><\/div>\n            <div class='filler'><\/div>\n        <\/div>\n\n    \n    <\/div>[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; css=&#8221;.vc_custom_1610556427925{background-image: url(https:\/\/www.kappadata.be\/wp-content\/uploads\/2020\/10\/Kappa-Data-Header-2.jpg?id=1191) !important;}&#8221; z_index=&#8221;&#8221;][vc_column][qode_elements_holder number_of_columns=&#8221;one_column&#8221;][qode_elements_holder_item advanced_animations=&#8221;no&#8221; item_padding=&#8221;5% 10% 10% 10%&#8221;][vc_column_text] Threat Hunting [\/vc_column_text][vc_column_text] When an AI-based antivirus is no longer sufficient&#8230; [\/vc_column_text][vc_empty_space height=&#8221;80px&#8221; el_class=&#8221;onlyphone&#8221;][\/qode_elements_holder_item][\/qode_elements_holder][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; background_color=&#8221;#f3f3f3&#8243; padding_top=&#8221;20&#8243;][vc_column css=&#8221;.vc_custom_1604415412261{margin-top: -100px !important;}&#8221;][qode_elements_holder&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":9390,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full_width.php","meta":{"_acf_changed":false,"rs_blank_template":"","rs_page_bg_color":"","slide_template_v7":"","_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"class_list":["post-9401","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Threat Hunting | Kappa Data<\/title>\n<meta name=\"description\" content=\"No matter what they have in mind, the consequences are rarely minuscule, which is why we&#039;ve set up all kinds of shields such as firewalls, email security and endpoint protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/threat-hunting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Hunting | Kappa Data\" \/>\n<meta property=\"og:description\" content=\"No matter what they have in mind, the consequences are rarely minuscule, which is why we&#039;ve set up all kinds of shields such as firewalls, email security and endpoint protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/threat-hunting\/\" \/>\n<meta property=\"og:site_name\" content=\"Kappa Data\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/kappadata\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-28T14:15:04+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/solutions\\\/hot-topics\\\/threat-hunting\\\/\",\"url\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/solutions\\\/hot-topics\\\/threat-hunting\\\/\",\"name\":\"Threat Hunting | Kappa Data\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#website\"},\"datePublished\":\"2022-10-04T08:21:42+00:00\",\"dateModified\":\"2023-04-28T14:15:04+00:00\",\"description\":\"No matter what they have in mind, the consequences are rarely minuscule, which is why we've set up all kinds of shields such as firewalls, email security and endpoint protection.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/solutions\\\/hot-topics\\\/threat-hunting\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/solutions\\\/hot-topics\\\/threat-hunting\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/solutions\\\/hot-topics\\\/threat-hunting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT solutions\",\"item\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hot Topics\",\"item\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/solutions\\\/hot-topics\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Threat Hunting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/\",\"name\":\"Kappa Data\",\"description\":\"The Art of IT-infrastucture, security and IoT distribution\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#organization\",\"name\":\"Kappa Data\",\"url\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.kappadata.nl\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Kappa-Data-600x120-Horizontaal-No-Base.png\",\"contentUrl\":\"https:\\\/\\\/www.kappadata.nl\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Kappa-Data-600x120-Horizontaal-No-Base.png\",\"width\":600,\"height\":120,\"caption\":\"Kappa Data\"},\"image\":{\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/kappadata\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/kappa-data-nederland\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Threat Hunting | Kappa Data","description":"No matter what they have in mind, the consequences are rarely minuscule, which is why we've set up all kinds of shields such as firewalls, email security and endpoint protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/threat-hunting\/","og_locale":"en_US","og_type":"article","og_title":"Threat Hunting | Kappa Data","og_description":"No matter what they have in mind, the consequences are rarely minuscule, which is why we've set up all kinds of shields such as firewalls, email security and endpoint protection.","og_url":"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/threat-hunting\/","og_site_name":"Kappa Data","article_publisher":"https:\/\/facebook.com\/kappadata","article_modified_time":"2023-04-28T14:15:04+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/threat-hunting\/","url":"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/threat-hunting\/","name":"Threat Hunting | Kappa Data","isPartOf":{"@id":"https:\/\/www.kappadata.nl\/en\/#website"},"datePublished":"2022-10-04T08:21:42+00:00","dateModified":"2023-04-28T14:15:04+00:00","description":"No matter what they have in mind, the consequences are rarely minuscule, which is why we've set up all kinds of shields such as firewalls, email security and endpoint protection.","breadcrumb":{"@id":"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/threat-hunting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/threat-hunting\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/threat-hunting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kappadata.nl\/en\/"},{"@type":"ListItem","position":2,"name":"IT solutions","item":"https:\/\/www.kappadata.nl\/en\/solutions\/"},{"@type":"ListItem","position":3,"name":"Hot Topics","item":"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/"},{"@type":"ListItem","position":4,"name":"Threat Hunting"}]},{"@type":"WebSite","@id":"https:\/\/www.kappadata.nl\/en\/#website","url":"https:\/\/www.kappadata.nl\/en\/","name":"Kappa Data","description":"The Art of IT-infrastucture, security and IoT distribution","publisher":{"@id":"https:\/\/www.kappadata.nl\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kappadata.nl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.kappadata.nl\/en\/#organization","name":"Kappa Data","url":"https:\/\/www.kappadata.nl\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kappadata.nl\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2023\/03\/Kappa-Data-600x120-Horizontaal-No-Base.png","contentUrl":"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2023\/03\/Kappa-Data-600x120-Horizontaal-No-Base.png","width":600,"height":120,"caption":"Kappa Data"},"image":{"@id":"https:\/\/www.kappadata.nl\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/kappadata","https:\/\/www.linkedin.com\/company\/kappa-data-nederland\/"]}]}},"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/pages\/9401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/comments?post=9401"}],"version-history":[{"count":2,"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/pages\/9401\/revisions"}],"predecessor-version":[{"id":10408,"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/pages\/9401\/revisions\/10408"}],"up":[{"embeddable":true,"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/pages\/9390"}],"wp:attachment":[{"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/media?parent=9401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}