article thumbnail

TTP-based threat hunting with Dynatrace Security Analytics and Falco Alerts solves alert noise

Dynatrace

Not only that, teams struggle to correlate events and alerts from a wide range of security tools, need to put them into context, and infer their risk for the business. In this blog post, we’ll use Dynatrace Security Analytics to go threat hunting, bringing together logs, traces, metrics, and, crucially, threat alerts.

Analytics 195
article thumbnail

How Netflix uses eBPF flow logs at scale for network insight

The Netflix TechBlog

By Alok Tiagi , Hariharan Ananthakrishnan , Ivan Porto Carrero and Keerti Lakshminarayan Netflix has developed a network observability sidecar called Flow Exporter that uses eBPF tracepoints to capture TCP flows at near real time. Without having network visibility, it’s difficult to improve our reliability, security and capacity posture.

Network 325
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Dynatrace extends contextual analytics and AIOps for open observability

Dynatrace

With extended contextual analytics and AIOps for open observability, Dynatrace now provides you with deep insights into every entity in your IT landscape, enabling you to seamlessly integrate metrics, logs, and traces—the three pillars of observability. Dynatrace extends its unique topology-based analytics and AIOps approach.

Analytics 246
article thumbnail

What is application security monitoring?

Dynatrace

Continuously monitoring application behavior, network traffic, and system logs allows teams to identify abnormal or suspicious activities that could indicate a security breach. Incident detection and response In the event of a security incident, there is a well-defined incident response process to investigate and mitigate the issue.

article thumbnail

Stream logs to Dynatrace with Amazon Data Firehose to boost your cloud-native journey

Dynatrace

Real-time streaming needs real-time analytics As enterprises move their workloads to cloud service providers like Amazon Web Services, the complexity of observing their workloads increases. Take the example of Amazon Virtual Private Cloud (VPC) flow logs, which provide insights into the IP traffic of your network interfaces.

Cloud 252
article thumbnail

What the NIS2 Directive means for application security

Dynatrace

The Network and Information Systems 2 (NIS2) Directive, which goes into effect in Oct 2024, aims to enhance the security of network and information systems throughout the EU. NIS2 is an evolution of the Network and Information Systems (NIS) Security Directive, which has been in effect since 2016.

article thumbnail

Dynatrace and Red Hat expand enterprise observability to edge computing

Dynatrace

As an example, many retailers already leverage containerized workloads in-store to enhance customer experiences using video analytics or streamline inventory management using RFID tracking for improved security. Moreover, edge environments can be highly dynamic, with devices frequently joining and leaving the network.

Retail 258