3 Big data security analytics techniques you can apply now to catch advanced persistent threats

3 Big data security analytics techniques you can apply now to catch advanced persistent threats

Cover

This technical white paper demonstrates how to use Big Data security analytics techniques to detect advanced persistent threat (APT) cyber attacks, and it shows how HP ArcSight—a Security Information and Event Management (SIEM) solution from HP—applies these techniques to spot and stop attacks.

APTs use a “low and slow” attack profile that is difficult to distinguish from legitimate activity. But by correlating massive amounts of data from multiple sources you can detect and stop them. The paper presents three techniques that you can apply to any IT environment:

  1. Detect account abuse by insiders and APTs.
  2. Identify data exfiltration by APTs.
  3. Identify and alert to new program execution.

For each technique, the paper presents an approach to detecting the situation and details the steps to implement the approach. Then it goes further to show how HP ArcSight does it. Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.

Vendor:
Hewlett-Packard Company
Posted:
15 Aug 2014
Published:
19 Nov 2013
Format:
PDF
Length:
11 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy