VIDEO: Walking Through Basic Application Rules in RSA Security Analytics
Application rules are a swiss army knife for processing tasks and metadata generation tasks within the RSA Security Analytics platform. They can be used to offload logic and expensive computation from investigation and reporting by moving more complex queries early on in the processing pipeline, and they can be used to tag data with metadata as it comes in. In this brief six-minute video, YouTuber and security expert Sean Ennis gives a detailed walkthrough of how to create Application Rules within the RSA Security Analytics platform.
Widget not in any sidebars
Widget not in any sidebars
This article was written by Jeff Edwards on February 5, 2016
Jeff Edwards
Jeff Edwards is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large. He holds a Bachelor of Arts Degree in Journalism from the University of Massachusetts Amherst, and previously worked as a reporter covering Boston City Hall.
- Five Questions You Need To Ask Yourself When Evaluating SIEM Solutions - November 8, 2017
- Winning the Data Breach War with User and Entity Behavioral Analytics - November 3, 2017
- 5 Alternatives to The Gartner Magic Quadrant for SIEM - October 31, 2017