SHARE
Uncategorized / March 23, 2016

Enhancing Metadata with Additional Context for Improved Threat Detection

The importance of quickly finding malware and remediating attacks increases daily as hackers create new methods of bypassing perimeter security and delivering fresh exploits. The simple truth is that the longer an exploit goes undiscovered, the greater the cost and impact. Unfortunately, security tools are struggling to find anomalous activity in a seemingly endless avalanche of information. They need to be fed more meaningful, summarized data—which is why many organizations are now focusing on metadata. Having more “data about the data” enhances the ability of SIEM appliances to discern real threats in network traffic from false alarms.

Read the full article.


Active Visibility. This blog series looks at critical cyber-security issues that can be mitigated or better managed by adopting new and innovative approaches to traffic visibility and monitoring. The ability to gain complete traffic visibility is essential to directing traffic to security appliances and solutions to optimize their effectiveness. In addition, there are new “best practices” to improve security through traffic monitoring for virtual and cloud infrastructure. This blog series will identify tactical as well as strategic issues around this topic. See past blogs – Blog #1 – Blog #2 – Blog #3 – Blog #4 – Blog #5 – Blog #6 – Blog #7 – Blog #8 – Blog #9 – Blog #10 – Blog #11 – Blog #12 – Blog #13 – Blog #14 – Blog #15 – Blog #16 – Blog #17 – Blog #18 – Blog #19 – Blog #20

Back to top