Network World APM "Shootout"
Network World tested ExtraHop and APM products from BMC, Dell Foglight, Fluke Visual, and BlueStripe. The comparison demonstrated the difference between the ExtraHop wire data analytics platform and traditional APM products.
Read the full blog post.
Lessons from Target's Data Breach: Watch All Activity on the Wire
For 19 days during the 2013 holiday season, Target fell victim to data thieves who made away with account details on more than 70 million customers even though industry analysts say that Target had adequate security defenses and complied with PCI standards. For IT teams, this unfortunate incident underscores the need to assume you've already been hacked. Read the blog posts below to learn more.
What IT Can Learn from Target's Data Breach
Detecting Malware Such as BlackPOS
A Web Services Wonderland: Why Nobody Analyzes HTTP Like ExtraHop
Many monitoring vendors claim to analyze HTTP, but the web services that are built on top of HTTP are nearly always blind spots for these tools. In this blog post, ExtraHop Sales Engineering Director Matt Cauthorn provides a brief technical overview of HTTP, lists some critical HTTP-based web services protocols, and then explains why only ExtraHop offers the flexibility to analyze any web services protocol.
Read the full blog post.
Verizon’s RISK Team: Timeline of a Data Breach
What happens after a hacker gets a foot in the door? The 2013 Data Breach Investigations Report from Verizon analyzed more than 47,000 security incidents to find out. The report shows that once hackers are able to compromise perimeter defenses, they often spend months silently exfiltrating data before they are discovered. Moreover, most data breaches are reported by outside parties, such as customers and fraud-detection entities.
Download the full report for free here.
|