From the Bottom to the Top: The Evolution of Application Monitoring

  • Wednesday, February 29, 2012 | 9:30 AM – 10:20 AM | Room: Room 120

View all Sessions

Inexorable trends are pushing security to the application layer. Web apps are low-hanging fruit for attackers, and the move to cloud and mobile computing increases the criticality of application security. The session covers new thinking about application monitoring, focusing on how applications can be “instrumented” to proactively detect security issues and record security-relevant logs.


This document was retrieved from on Sun, 04 Oct 2015 08:46:22 -0400.
© 2015 EMC Corporation. All rights reserved.