Threat detection taxonomy: Anomaly detection methods in the enterprise

Threat detection taxonomy: Anomaly detection methods in the enterprise

Date: Jan 03, 2013

Enterprise information security managers know there are many different types of attacks, and similarly, many different threat detection strategies for detecting those attacks. But which detection techniques work best to spot which attack scenarios?

In this special video presentation, expert Diana Kelley provides an enterprise threat detection taxonomy and reviews various techniques, such as anomaly detection, signature-based detection, velocity detection, correlated-threat detection, reputation-based detection and cloud-based detection. The presentation examines the pros and cons of each method and offers advice on the scenarios in which each technique works best.

About the speaker
Diana Kelley is a partner with Amherst, N.H.-based consulting firm SecurityCurve. She formerly served as vice president and service director with research firm Burton Group. She has extensive experience creating secure network architectures and business solutions for large corporations and delivering strategic, competitive knowledge to security software vendors.

More on Network Behavior Anomaly Detection (NBAD)

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: