Networking professionals have found it's not enough to go with signature-based intrusion detection and prevention systems for network security. Now they've added behavior analysis and specifically anomaly detection to get the most benefit out of their systems. But that approach is not without its challenges and they need the appropriate tools to make it work. With this advanced workshop, you'l learn how these intrusion prevention system (IPS) techniques deter hackers and protect your network.
In this part:
Signature vs. anomaly-based behavior analysis
Networking professionals have found it's not enough to go with signature-based intrusion detection and prevention systems for network security. Now they've added behavior analysis and specifically anomaly detection to get the most benefit out of their systems. With this advanced workshop you'll learn about the challenges and the appropriate tools to make it work.
Network Management Strategies for the CIO