Cybersecurity
In this blog I'd like to highlight one very critical area of AIA that came out in my research: the growing role of security as an integrated requirement for performance, change and capacity management ...
A majority (80 percent) of organizations receiving 500 or more severe/critical alerts per day currently investigate less than one percent of those alerts, according to new research from Enterprise Management Associates (EMA), sponsored by Savvius ...
Gartner, Inc. has highlighted the top 10 Internet of Things (IoT) technologies that should be on every organization's radar through the next two years ...
As technology continues to be a business differentiator and provide competitive advantage, tech budgets are increasing for almost half of organizations (46%), according to the annual Forecast Survey from Computerworld ...
In Part 2 of this blog, we highlight new regulations in the global securities industry that underscore the risks companies face when they don’t have a good handle on user experience or application performance across the application delivery chain ...
The PADS (Performance Analytics Decision Support) Framework recommends a more strategic approach to user experience and application performance. But deeper intelligence into the application delivery chain can also help companies meet compliance and security requirements more effectively in order to achieve their risk management objectives ...
BMC and Forbes Insights recently surveyed executives in North America and Europe to get their perspective on their organization's overall security health and to find out what issues are critical to address. The results revealed the need for a framework organizations can use to get a solid strategy in place for improved security and compliance ...
Most security experts agree that the rapidly changing nature of malware, hack attacks and government espionage practically guarantees your IT infrastructure will be compromised. Once an attacker is within the network, it can be very difficult to identify and eliminate the threat without deep-packet inspection. The right APM solution that includes network forensics can help IT operations deliver superior performance for users, and when incorporated into your IT security initiatives, deep packet inspection can provide an extra level of support to existing antivirus software, Intrusion Detection System and Data Loss Prevention solutions ...
Security breaches are common today – from computer viruses, such as Bash Bug or Heartbleed, undermining the security of millions of websites, to credit card cyber theft experienced by big retailers. One effort to protect cardholder information is Payment Card Industry (PCI) Data Security Standard (DSS), which is applied wherever cardholder data is stored, processed or transmitted. APM designed to capture and retain network application transaction data has the potential to violate compliance. Below is an outline of the 12 requirements to be PCI DSS-compliant and how to manage APM to avoid violations ...
Twenty-five percent of distributed denial of service (DDoS) attacks that occur in 2013 will be application-based, according to Gartner, Inc.
In the face of an ever-evolving cyber security landscape, researchers at Radware have identified a number of new attack methods representative of today’s increasingly sophisticated and severe DDoS threat ...
Most security reference architectures rely on the old methods to get warnings about security issues such as use of a SIEM and a log analysis tool to interpret what is in the SIEM. However, there is a richer set of more immediate data that can help us with the problem of security notifications: APM Data ...
Despite the increasing sophistication and severity of cyber attacks, a survey of more than 700 senior IT professionals reveals that organizations are surprisingly unarmed to deal with today’s threat landscape.
In recognition of National Cyber Security Awareness Month (NCSAM), Lancope offered 5 tips for improving enterprise network protection ...
HP unveiled new research indicating that the cost and frequency of cybercrime have both continued to rise for the third straight year.
The Cloud is not only disrupting the way in which organizations acquire and utilize computing power and business applications, it is also changing the way application development and IT operations teams view their roles and the tools they use to perform their responsibilities. Certainly, this site is clearly illustrates how the idea of APM is changing in light of the rapid adoption of Cloud solutions ...
In many organizations, security operations work in siloes to IT Operations. As a result, security vulnerabilities have to be handled twice: once by the SOC groups or security teams, and secondly by the IT Operations team who could not initially identify the issue. Consequently, you cannot establish any automation for information sharing or event correlation between security vulnerabilities and performance issues. Here are 10 tips for efficient SOC/NOC collaborate ...
Pages
- « first
- ‹ previous
- 1
- 2
- 3