From the Bottom to the Top: The Evolution of Application Monitoring

  • Wednesday, February 29, 2012 | 9:30 AM – 10:20 AM | Room: Room 120

View all Sessions

Inexorable trends are pushing security to the application layer. Web apps are low-hanging fruit for attackers, and the move to cloud and mobile computing increases the criticality of application security. The session covers new thinking about application monitoring, focusing on how applications can be “instrumented” to proactively detect security issues and record security-relevant logs.


This document was retrieved from on Mon, 30 Mar 2015 00:23:53 -0400.
© 2015 EMC Corporation. All rights reserved.