Data Correlation - Why keep this valuable information in a corner? presented at SOURCEDublin 2013

by Xavier Mertens,

Summary : There are tons of security tools that can be deployed in networks. Usually they address specific threats like malware detection, protocol inspection, antivirus or log management. Based on their behavior, they may have data that could be used by other solutions to increase your overall protection. This talk will review examples of dynamic data exchanges between solutions to increase your security. A good example of interaction between devices is the automatic reconfiguration of firewalls with IP addresses reported as malicious by malware analysis tools.