Trevor Welsh from McAfee joins Eric Schou from HP and industry analyst Robin Layland to discuss what a SIEM needs to identify and stop low and slow attacks that use advanced persistence threats (APT) in real-time. We start by identifying why legacy SIEMs have problems dealing with APT and then talk about the characteristics of low and slow attacks. Next, we explore how baselining, and good correlation analysis combined with risk assessment can turn your SIEM into a self-sustaining SIEM that can catch the bad guys in real-time.
You are currently subscribed as garn14.tech@blogger.com If you do not wish to receive future mailings from Network World Online Resources, unsubscribe.
When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.