- How Anomaly Detection fits into Incident Evaluation
10
- Use Case: Detecting Anomalous Authentication Errors
11
- Demo - Query Authentication Errors
12
- Demo - Create Anomaly Detection
13
- Demo - Authentication Alert Workflow
14
- Demo - Security Investigator
15
- More Security Use Cases
Description:
Explore the power of anomaly detection in cybersecurity through this 34-minute video from Dynatrace. Learn about different anomaly detection analyzers provided by Dynatrace Davis® AI and how to simulate them using a notebook. Discover when to apply various anomaly detection strategies like static, auto-adaptive, and seasonal baselining. Gain insights into how anomaly detection enhances security use cases, making security engineers more efficient when analyzing scenarios such as abnormal authentication requests. Follow along with demonstrations on querying authentication errors, creating anomaly detection rules, and navigating security investigation workflows. Understand how anomaly detection fits into incident evaluation and explore additional security use cases to elevate your organization's security posture.
Elevating Security with Dynatrace Davis Anomaly Detection