Not what you are looking for? Ask the experts!
How is Norton Core handling inside threats?
I am curious about how Norton Core actually handles inside threats. I am aware that Norton Core is connected to the Norton cloud and that way it's able to analyze malicious websites for viruses and stuff like that, and it will be able to block anything suspicious that Norton has in their database. But, how about inside threats, say my good friend is able to connect to my Core and then that friend actually starts acting malicious and controlling some of my devices without me knowing it, e.g. a brute force attack to figure out pins and passwords of some IoT devices that are connected to the router.
Will Norton Core be able to detect such a malicious activity from a device that's actually connected to it? Also, how does the quarantine mechanism work? Is it able to quarantine, say a device that's connected to my Core (somehow the hacker knows my password), a PC/laptop, and then it launches brute force attacks. Does Norton Core know that this kind of traffic is unusual and, thus, it needs to be blocked?
P.S. I am aware that there is a mechanism to create a Guest Network but I am talking from another perspective where an attacker actually knows my Core password (yes, although the phone app suggests me to have a really "strong" password - there is no password that is too strong for very smart hackers out there.. :) ).