The Virtualization Practice Releases 'Using Application Performance Management for Security' White Paper


WRENTHAM, MA--(Marketwire - Sep 26, 2012) - Today The Virtualization Practice, an industry analyst firm that provides unique analysis, commentary and resources on Virtualization and Cloud Computing, released a new white paper titled "Using Application Performance Management for Security." It was written by analyst Edward L. Haletky and sponsored by New Relic.

The biggest problem security practitioners face today is finding an unknown security issue as soon as possible after the issue occurs. There are several types of solutions to read application and system log files, correlate the data and eventually come out with a possible security element, but for a Security Information and Event Management (SIEM) or tool to pick it up, it has to be a known type of issue. It is very difficult to determine if an unknown is a security issue.

There is an easier way to determine if something unknown is happening within an application, and that is to use an application performance management tool that tracks not only the time for actions, but also from where actions start and to where actions end up. Actions can occur through all tiers of an application from the web frontend through to the database.

"All you need to understand is how to interpret what you are seeing and starting the security investigation side by side with the application or system investigation," said Edward L. Haletky, The Virtualization Practice CEO and Analyst. "Eventually, you can rule out a security issue or determine that the performance of an application or system changed due to an attack."

In order for an Application Performance Management system to be used as an early warning system, it:

  • Should not require a developer to determine if there is an anomaly
  • Should be able to tell graphically if there is an abnormality, with the ability to delve further over time to determine if the activity is normal over a span of time
  • Can tell directly if some network activity is from well known or short-lived domain names used by attackers
  • Should be tied in some fashion to change management to account for known changes to the code base, and to restart baselines

To get white paper, simply go to The Virtualization Practice website http://www.virtualizationpractice.com, register and then download for free at: http://www.virtualizationpractice.com/?file_id=372.

About The Virtualization Practice
The Virtualization Practice provides analysis, commentary and resources on current Virtualization and Cloud Computing news, events and community. The Virtualization Practice features world-class experts as analysts for 15 Virtualization and Cloud Computing topics: Agile Cloud Development, Application Virtualization, Business Agility, Cloud Computing, Data Center Virtualization, Desktop Virtualization, IT as a Service, Performance Management, Personalization Virtualization, Presentation Virtualization, SMB Virtualization, Storage Networking, Virtualization Backup, Virtualization Management and Virtualization Security. They are responsible for writing original, objective, analytical posts in their area of expertise, for writing and maintaining a white paper on their market and the vendors that serve that market and for assisting sponsoring vendors with marketing activities. For more, please visit: http://www.virtualizationpractice.com.

Facebook: http://www.facebook.com/TheVirtualizationPractice

Twitter: http://twitter.com/vPractice

Contact Information:

Contact:
Amber Rowland
amber@therowlandagency.com
+1-650-814-4560