Главная
Study mode:
on
1
Introduction
2
Disclaimer
3
Application Network Perspective
4
Denial of Service
5
Net Flow
6
DHCP
7
Anomaly Behavior
8
Authentication
9
Virtualization
10
Cyber Instrumentation
11
Cloud Services
12
Leveraging APM
13
Leveraging alarms
14
Packet capture
15
Additional Intelligence
16
DNS
17
PCI
18
Application Diagrams
19
Reporting in Evidence
20
Top Talkers
21
Certificate Security
22
Metadata
23
Server Resets
24
Attack Reconstruction
25
View Information
26
Host Information
27
Host Search
28
Integration Points
29
More Information
30
The Message
Description:
Explore how to enhance your cyber defense strategy by leveraging Application Performance Management (APM) and Network Performance Management (NPM) solutions in this 41-minute conference talk from the Central Ohio InfoSec Summit 2016. Delve into topics such as denial of service, net flow, DHCP, anomaly behavior, authentication, virtualization, and cyber instrumentation. Learn about cloud services, alarm leveraging, packet capture, and additional intelligence gathering techniques. Discover how to utilize DNS, PCI compliance, application diagrams, and reporting for evidence. Gain insights on top talkers, certificate security, metadata analysis, server resets, and attack reconstruction. Understand the importance of view information, host information, host search, and integration points to strengthen your overall cybersecurity posture.

Leveraging Your APM NPM Solutions to Compliment Your Cyber Defense Strategy

Add to list
0:00 / 0:00