• Customer Login
  • Support
  • Contact Sales
Security. Compliance. Cloud.
  • Home
  • Solutions
  • Overview

    Security-as-a-Service in 2 minutes

    Alert Logic SAAS Video
    Schedule Demo Today

    Solutions

    • Full Stack Security
    • Managed Cloud Security
      Alert Logic® Cloud Defender®
    • AWS Vulnerability Management
      Alert Logic® Cloud Insight
    • Network Threat Detection
      Alert Logic® Threat Manager™
    • Web Application Firewall
      Alert Logic® Web Security Manager
    • Log Correlation & Analysis
      Alert Logic® Log Manager™
    • Experts Included
    • Security Operation Center
    • Threat Intelligence
    • Threat Research
    • Compliance Management
    • PCI DSS
    • HIPAA
    • SOX Cobit

    Deployment Platforms

      Amazon Web Services Microsoft Azure On-Premises Security On-Premises
  • Customers
    • Customers Overview
    • Case Studies
    • Voice of Our Customers
    • Our Customers
    • Account Login
    FEATURED CASE STUDY
    Connect Group PLC
    Connect Group PLC

    "One of the key benefits of the partnership is the agility of the Alert Logic service, whether it is an on-premises deployment, cloud integrated deployment or a hybrid, and the rate at that can be executed."

    Seamus Macloughlin
    Group Head of Information Security

  • Partners
    • Partners Overview
    • Find a Partner
    • Apply to be a Partner
    • Partner Events
    Partner Resource Center
    FEATURED PARTNER WEBINAR
    Security: Enabling the Digital Revolution Without Disruption

    Security: Enabling the Digital Revolution Without Disruption

    According to a recent survey of UK senior ITDMs by IDG, over a third of respondents stated that managing security was one of the biggest issues faced when implementing digital transformation.

    View Webinar

  • Resources
    • Resource Library
    • Blog
    • Industry Reports
    • Cloud Security Report 2015
    • Threat Reports
    • Voice of Our Customers
    • Datasheets
    • ActiveIntegration API
    • Zero Day Magazine
    • Infographics
    • Webinars
    • Whitepapers
    • Security Checklists
    • Videos
    • Support
    FEATURED REPORT
    Top Security Vendors Ranked By 451 Research

    Top Security Vendors Ranked By 451 Research

    Learn More
  • About Us
    • OVERVIEW:
    • About Us
    • Leadership
    • Board of Directors
    • Investors
    • Awards
    • Corporate Compliance
    • MEDIA & EVENTS:
    • Press Releases 
    • Media Coverage
    • Events
    • SUPPORT:
    • Community
    • Alert Logic Docs
    • Learn
    • CAREERS:
    • Working At Alert Logic
    • Alert Logic Opportunities
    • Celebrating Our Employees
Close
  • Home
  • Solutions
    • SOLUTIONS OVERVIEW
    • Managed Cloud SecurityAlert Logic® Cloud Defender®
    • Vulnerability ManagementAlert Logic® Cloud Insight
    • Network Threat DetectionAlert Logic® Threat Manager™
    • Web Application SecurityAlert Logic® Web Security Manager
    • Log Correlation and AnalysisAlert Logic® Log Manager™
    • Compliance
    • DEPLOYMENT PLATFORMS
    • Amazon Web Services
    • Microsoft Azure
    • Cloud
    • On-Premises
    • Hybrid Infrastructure
  • Customers
    • Customers Overview
    • Case Studies
    • Voice of Our Customers
    • Tell Us Your Story
    • Our Customers
    • Account Login
  • Partners
    • Partners Overview
    • Find a Partner
    • Apply to be a Partner
    • Partner Resource Center
    • Partner Events
  • Resources
    • Resource Library
    • Blog
    • Industry Reports
    • Cloud Security Report 2015
    • Threat Reports
    • Webinars
    • Whitepapers
    • Security Checklists
    • Voice of Our Customers
    • Datasheets
    • ActiveIntegration API
    • Zero Day Magazine
    • Case Studies
    • Infographics
    • Videos
    • Support
  • About Us
    • About Us
    • Leadership
    • Board of Directors
    • Investors
    • Awards
    • Corporate Compliance
    • Press Releases 
    • Media Coverage
    • Events
    • Working At Alert Logic
    • Alert Logic Opportunities
    • Celebrating Our Employees
  • Support

Understanding
the Cyber Kill chain®

Lockheed Martin's Computer Incident Response Team developed the Cyber Kill Chain® to describe different stages of an attack.
Scroll down to view these stages of an attack.

1. Identify & Recon

The attacker is gathering information about the targeted environment, scanning for open ports and vulnerabilities, and evaluating how to penetrate systems.

2. Initial Attack

The attack plan has been formulated and the campaign is kicked off. Multiple attack vectors are deployed, persistently trying different methods to infiltrate the target.

3. Command / Control

Once an intrusion attack is successful, the attacker starts to position itself to take over the compromised asset, and use it to expand his foothold in the environment. The orchestration of how to exfiltrate the targeted data begins here.

4. Discover / Spread

The attacker explores to locate where the target data resides, and identify additional assets to own.

5. Extract / Exfiltrate

Once the target data has been located, the attacker employs a low and slow approach to stealthily extract the data and go undetected.

Impact

The degree of impact that data breaches can have on organizations can vary, and go beyond just financial loss. It can affect areas such as brand credibility and consumer mistrust, regulator scrutiny, and business operations.

Understanding the Cyber Kill Chain

Available Now: Alert Logic Cloud Security Report

Complete the form below to download the report. Get a copy of The Cyber Kill Chain Infographic here.
Alert Logic
  • Solutions
  • Customers
  • Partners
  • Resources
  • About Us
  • Toll Free: +1.844.816.1051
  • Corporate: +1.713.484.8383
  • UK: +44 (0) 203 011 5533
  • Fax: +1.713.660.7988
  • Email: info@alertlogic.com
Alert Logic
Sales: 844.816.1051 Support: 877.484.8383
Copyright © 2010-2017 Alert Logic, Inc.
All rights reserved. Terms of Use | Privacy Policy