3 Big Data Security Analytics Techniques You Can Apply Now to Catch APTs

3 Big Data Security Analytics Techniques You Can Apply Now to Catch APTs

This white paper demonstrates how to use big data security analytics techniques to detect advanced persistent threat (APT) cyber-attacks. It also shows how a Security Information and Event Management (SIEM) solution applies these techniques to spot and stop attacks.

APTs use a "low and slow" attack profile that's difficult to distinguish from legitimate activity. But by correlating massive amounts of data from multiple sources you can detect and stop them.

The paper presents three techniques that you can apply to any IT environment, including how to:

  • Detect account abuse by insiders and APTs;
  • Identify data exfiltration by APTs;
  • Identify and alert new program execution.

For each technique, the paper presents an approach to detecting the situation and details the steps to implement the approach.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.