“We use a log-based approach using data from the existing devices to create full scope visibility,” Fred said. This approach avoids the problems created by encrypted communications from the malware, which some types of malware detection systems can’t catch.”