3 Big Data Security Analytics Techniques You Can Apply Now to Catch Advanced Persistent Threats

The following is external content provided as a free resource for blog readers.

APTs use a “low and slow” attack profile that is difficult to distinguish from legitimate activity. But by correlating massive amounts of data from multiple sources you can detect and stop them. The paper presents three techniques that you can apply to any IT environment:

  1. Detect account abuse by insiders and APTs.

  2. Identify data exfiltration by APTs.

  3. Identify and alert to new program execution.

For each technique, the paper presents an approach to detecting the situation and details the steps to implement the approach. Then it goes further to show how HP ArcSight does it. Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.

Request Free!

No comments:

Post a Comment