- Présentations
- Documents
- Infographies
Log Mining: Beyond Log Analysis
Anton Chuvakin
•
il y a 16 ans
Log Data Mining
Anton Chuvakin
•
il y a 14 ans
ISTR Volume 18
Symantec
•
il y a 11 ans
1 Million Writes per second on 60 nodes with Cassandra and EBS
Jim Plush
•
il y a 8 ans
Personal Finance for Engineers (Palantir 2014)
Adam Nash
•
il y a 10 ans
Baselining Logs
Anton Chuvakin
•
il y a 15 ans
Baselining Logs
Anton Chuvakin
•
il y a 15 ans
Revolutionizing Advanced Threat Protection
Blue Coat
•
il y a 10 ans
Qradar Business Case
Enterprise Technology Management (ETM)
•
il y a 14 ans
Threat Intelligence Workshop
Priyanka Aash
•
il y a 8 ans
6 Critical SaaS Engineering Mistakes to Avoid
SolarWinds Loggly
•
il y a 9 ans
Advanced Persistent Threats: Reality or Myth
Rahul Mohandas
•
il y a 12 ans
Blue Coat: Application Delivery Networks
AEC Networks
•
il y a 13 ans
Leverage Big Data for Security Intelligence
Stefaan Van daele
•
il y a 10 ans
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk
•
il y a 9 ans
Security Hands-On - Splunklive! Houston
Splunk
•
il y a 9 ans
Hands on Security - Disrupting the Kill Chain Breakout Session
Splunk
•
il y a 9 ans
Strategy Cloud and Security as a Service
Aberla
•
il y a 13 ans
Cloud Compliance Auditing - Closer 2011
Jonathan Sinclair
•
il y a 12 ans
Smart security solutions for SMBs
Jyothi Satyanathan
•
il y a 12 ans