Five key security analytics reports and how to build them

Josh Sokol

Advanced security analytics are a necessity in today's malware-laden world. Every day the company network is under assault, and information security pros need to stay on their toes. The first essential step is to understand who or what, exactly, is out to get you—or, rather, your network. There are five security analytics reports so useful that companies should run them daily, says Josh Sokol, who manages all aspects of information security for National Instrument. These reports include reviewing DNS requests, searching for "Fan Out" network traffic and for connections to blacklisted IPs, and more. Listen to his podcast and you'll learn not only why the five reports Sokol suggests are so useful but also how you can build them for your enterprise.


There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: