Find Threats Lurking on your Systems with Host-based Intrusion Detection and AlienVault USM
Sponsored by: AlienVault
October 5, 2015
View On-Demand
Host-based intrusion detection systems (HIDS) work by monitoring activity that is occurring internally on a host. HIDS look for unusual or nefarious activity by examining logs created by the operating system, looking for changes made to key system files, tracking installed software, and sometimes examining the network connections a host makes. AlienVault USM integrates HIDS with other key security controls to help you get the most out of HIDS, including:
Analyzing system behavior and configuration status to track user access and activity
Detecting system compromise, modification of critical configuration files (e.g. registry settings, /etc/password), common rootkits, and rogue processes
Correlating HIDS data with known IP reputation, vulnerability scans and more
Logging and reporting for PCI compliance
Register Now!
If you have already registered, click here to access
Speakers
Garrett Gross, Sr. Technical Product Marketing Manager. Garrett comes from a diverse IT background, including network/systems administration and sales engineering. As a former practitioner, he understands the challenges that businesses face and leverages that insight to develop IT security resources for the AlienVault community.
Mark Allen, Sales Engineer. Mark has been engaged in information security and system administration for over 15 plus years. Mark has extensive experience taking complex concepts and making them easier to understand. He has held a variety of technical roles from help desk to litigation support to systems engineer and IT Director for accounting and law firms and large companies such as Epicor, Dell, & Solarwinds.
About the Author
You May Also Like