Posted by: Margaret Rouse
anomaly detection, Malware, network security, Technology
|We knew that the volume of new attacks and the vectors used were only going to increase, so we chose to stay ahead of the curve with a behavioral analysis system. I believe behavior and anomaly-based solutions will be most effective long term.
Jamie Arnold, as quoted in SUNY’s Binghamton Monitors Network with Lancope’s StealthWatch
I spent part of the morning reading about anomaly-based network monitoring. In October, IBM announced that they would no longer sell the IBM Proventia Network Anomaly Detection System (ADS). Stealthwatch seems to be getting a lot of buzz, especially with college campuses whose biggest threats probably come from right inside the network.