Star 0

Abstract

Perimeter security is difficult when the perimeter is no longer clear. Today's IT landscapes often span on-premises data centers as well as public cloud, not to mention direct user interaction from mobile devices. In this session you will learn about monitoring techniques at unlimited scale and most importantly how to extract meaning from the data.