From the Bottom to the Top: The Evolution of Application Monitoring

  • Wednesday, February 29, 2012 | 9:30 AM – 10:20 AM | Room: Room 120
View all Sessions

Inexorable trends are pushing security to the application layer. Web apps are low-hanging fruit for attackers, and the move to cloud and mobile computing increases the criticality of application security. The session covers new thinking about application monitoring, focusing on how applications can be “instrumented” to proactively detect security issues and record security-relevant logs.


This document was retrieved from on Mon, 26 Jan 2015 09:27:49 -0500.
© 2015 EMC Corporation. All rights reserved.