Cybersecurity

June 16, 2016

In this blog I'd like to highlight one very critical area of AIA that came out in my research: the growing role of security as an integrated requirement for performance, change and capacity management ...

April 29, 2016

A majority (80 percent) of organizations receiving 500 or more severe/critical alerts per day currently investigate less than one percent of those alerts, according to new research from Enterprise Management Associates (EMA), sponsored by Savvius ...

April 08, 2016

Gartner, Inc. has highlighted the top 10 Internet of Things (IoT) technologies that should be on every organization's radar through the next two years ...

March 17, 2016

As technology continues to be a business differentiator and provide competitive advantage, tech budgets are increasing for almost half of organizations (46%), according to the annual Forecast Survey from Computerworld ...

March 15, 2016

In Part 2 of this blog, we highlight new regulations in the global securities industry that underscore the risks companies face when they don’t have a good handle on user experience or application performance across the application delivery chain ...

March 14, 2016

The PADS (Performance Analytics Decision Support) Framework recommends a more strategic approach to user experience and application performance. But deeper intelligence into the application delivery chain can also help companies meet compliance and security requirements more effectively in order to achieve their risk management objectives ...

January 25, 2016

BMC and Forbes Insights recently surveyed executives in North America and Europe to get their perspective on their organization's overall security health and to find out what issues are critical to address. The results revealed the need for a framework organizations can use to get a solid strategy in place for improved security and compliance ...

December 12, 2014

Most security experts agree that the rapidly changing nature of malware, hack attacks and government espionage practically guarantees your IT infrastructure will be compromised. Once an attacker is within the network, it can be very difficult to identify and eliminate the threat without deep-packet inspection. The right APM solution that includes network forensics can help IT operations deliver superior performance for users, and when incorporated into your IT security initiatives, deep packet inspection can provide an extra level of support to existing antivirus software, Intrusion Detection System and Data Loss Prevention solutions ...

November 18, 2014

Security breaches are common today – from computer viruses, such as Bash Bug or Heartbleed, undermining the security of millions of websites, to credit card cyber theft experienced by big retailers. One effort to protect cardholder information is Payment Card Industry (PCI) Data Security Standard (DSS), which is applied wherever cardholder data is stored, processed or transmitted. APM designed to capture and retain network application transaction data has the potential to violate compliance. Below is an outline of the 12 requirements to be PCI DSS-compliant and how to manage APM to avoid violations ...

February 22, 2013

Twenty-five percent of distributed denial of service (DDoS) attacks that occur in 2013 will be application-based, according to Gartner, Inc.

February 12, 2013

In the face of an ever-evolving cyber security landscape, researchers at Radware have identified a number of new attack methods representative of today’s increasingly sophisticated and severe DDoS threat ...

January 07, 2013

Most security reference architectures rely on the old methods to get warnings about security issues such as use of a SIEM and a log analysis tool to interpret what is in the SIEM. However, there is a richer set of more immediate data that can help us with the problem of security notifications: APM Data ...

November 16, 2012

Despite the increasing sophistication and severity of cyber attacks, a survey of more than 700 senior IT professionals reveals that organizations are surprisingly unarmed to deal with today’s threat landscape.

October 22, 2012

In recognition of National Cyber Security Awareness Month (NCSAM), Lancope offered 5 tips for improving enterprise network protection ...

October 08, 2012

HP unveiled new research indicating that the cost and frequency of cybercrime have both continued to rise for the third straight year.

September 24, 2012

The Cloud is not only disrupting the way in which organizations acquire and utilize computing power and business applications, it is also changing the way application development and IT operations teams view their roles and the tools they use to perform their responsibilities. Certainly, this site is clearly illustrates how the idea of APM is changing in light of the rapid adoption of Cloud solutions ...

September 14, 2012

In many organizations, security operations work in siloes to IT Operations. As a result, security vulnerabilities have to be handled twice: once by the SOC groups or security teams, and secondly by the IT Operations team who could not initially identify the issue. Consequently, you cannot establish any automation for information sharing or event correlation between security vulnerabilities and performance issues. Here are 10 tips for efficient SOC/NOC collaborate ...

Pages