2009: Reputation, attribution, and deterrence: the next chapter in network defense

Document created by tinacostilla on Sep 14, 2012Last modified by tliu on Jul 8, 2014
Version 2Show Document
  • View in full screen mode

2009

Reputation, attribution, and deterrence: the next chapter in network defense

Speaker: Marc Eisenbarth, HP

Internet host reputation is finding its way back into security vendor product sheets, with numerous superlatives and broad claims. In this session, we explore the merits and limitations of reputation-based approaches by equipping you technically to evaluate implementations and their ability to defend your enterprise. We’ll show you the shortcomings of traditional blacklists so you can recognize the benefits of reputation-based systems such as the ones implemented in HP TippingPoint and HP ArcSight. And we’ll share case studies so you can form your own opinions about which attack families are appropriate targets for a reputation-based mitigation strategy.

 

 

Attachments

Outcomes