VIDEO: Walking Through Basic Application Rules in RSA Security Analytics

Application rules are a swiss army knife for processing tasks and metadata generation tasks within the RSA Security Analytics platform. They can be used to offload logic and expensive computation from investigation and reporting by moving more complex queries early on in the processing pipeline, and they can be used to tag data with metadata as it comes in. In this brief six-minute video, YouTuber and security expert Sean Ennis gives a detailed walkthrough of how to create Application Rules within the RSA Security Analytics platform.


Widget not in any sidebars
Follow Jeff

Jeff Edwards

Jeff Edwards is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large.He holds a Bachelor of Arts Degree in Journalism from the University of Massachusetts Amherst, and previously worked as a reporter covering Boston City Hall.
Jeff Edwards
Follow Jeff

Leave a Reply

Your email address will not be published. Required fields are marked *