Behavioral Threat Analytics

You’ve probably heard there’s a new acronym in town: Real-time behavioral threat analytics (BTA). The concept here is the knitting together of security analytics with a broader view of network security data that includes the behavior at all the endpoints, viewed at a granularity that identifies and monitors the activities of specific users, devices, systems, and services. In essence, an enterprise's full fire hose of network activity is boiled down to a "story" of what the business does in normal operation, such that potentially dangerous variations in the story can be flagged and investigated. We'll take a look at what kinds of products fit into the real-time behavioral threat analytics approach to security and what we know so far about deploying such products successfully.

TOP

Johna Till Johnson
CEO and senior founding partner, Nemertes Research

Johna Till Johnson is CEO and senior founding partner of Nemertes Research, where she sets research direction and works with strategic clients. Till Johnson has decades of experience in technology design, deployment, and operations. Under her leadership, Nemertes has emerged as a leading trusted advisor to Fortune-50 and other world-class organizations.






Editorial Resources

About SearchSecurity.com

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure. We're the only information resource that provides immediate access to breaking industry news, virus alerts, new hacker threats and attacks, security certification training resources, security standard compliance, webcasts, white papers, podcasts, Security Schools, a selection of highly focused security newsletters and more -- all at no cost. Nowhere else will you find such a highly targeted combination of resources specifically dedicated to the success of today's IT-security professional.