Challenges with Real-time Correlation Hybrid Cloud and Legacy Environments
As cyber defenders position themselves to support the strategic business directions of their organizations' consumption of cloud technologies, it is critical to have:
- Appropriate end-to-end visibility and monitoring;
- Threat detection for anomalous user or entity behaviors;
- Ability to detect risky configurations, network intrusions, host vulnerabilities;
- Risk scores for every resource, across multi-cloud and legacy on-prem environments.
This presentation will explore this challenge and leading approaches being pursued to address this real-time correlation.