<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2180921&amp;fmt=gif">

Threats! What Threats?

We talk often about “threats” and “threat detection” in our marketing materials and in discussions with our customers. 

But my colleague, Steve Patton recently asked “why don’t we ever mention the types of threats we’re talking about?”

Well, that’s a great question, Steve !

Network Security for Threat Detection & Response

As a reminder, at Stamus Networks we are a provider of network-based threat detection and response solutions. The reason we focus on the network is that it holds the ground truth for an enterprise’s security posture and does not require complex endpoint agents in order to be effective.

Even as more organizations shift to cloud-based resources, encrypted transmission, and remote workforces, nearly all cyber threats generate communications that can be observed on the network. And in many BYOD environments and with the proliferation of IoT devices, you can’t rely on endpoint detection to uncover threats.

So, what threats are we talking about?

Users of our Stamus Security Platform (SSP) will be familiar with the list of threat coverage displayed on this SSP threat "coverage" screen:


This screen captures the key threat families we’re talking about.

And there are even more types of threats that can be detected by using our guided hunting interface to create a custom threat detection rule - which would appear on the above screen under “Custom Threats.”

In this article, I’d like to highlight a reasonably short list of 18.

Here's my short list:

Here's a short video I hope makes the point in 17 seconds.


In subsequent articles, we will describe what we mean by each of the above threat categories and explain what sorts of things we can uncover with the Stamus Security Platform.

Does this help, Steve?

So, next time my colleague Steve asks “why don’t we ever mention the types of threats we’re talking about?” I can thank him and point him to this blog.

If you’d like to get a live demonstration of the Stamus Security Platform or discuss how it might help you detect and respond to threats in your network, please click on the button below to request a demo.

D. Mark Durrett

Mark is the chief marketing officer (CMO) at Stamus Networks, where he has responsibility for go-to-market strategy and execution. Mark started his career as an electrical engineer and worked in digital circuit design of networking and telecom hardware for over a decade. He has over 25 years of experience leading marketing, product management and engineering for technology companies. Mark has served as the senior product and marketing executive at Netsertive, Emerging Threats, Overture Networks, Bell and Howell, Covelight Systems and Hatteras Networks. Mark resides in North Carolina, USA.

Schedule a Demo of Stamus Security Platform


Related posts

The Path to Data Sovereignty: Key Considerations for Security Telemetry

Most enterprise organizations gather extensive security data from their information (IT) and...

Uncovered with Stamus Security Platform: Tapped on the Shoulder

In this series of articles, we explore a set of use cases that we have encountered in real-world...

The Hidden Claws of APT 35: Charming Kitten

Don’t let the disarming name fool you.Charming Kitten, also known as APT 35, Newscaster Team, Ajax...