Data Storage Considerations for Security Analytics
This resource is published by Pure Storage
Log analytics has taken increasing importance over the years. In particular, applications that use log analytics have provided key new capabilities for security operations teams within IT organizations. The many log analytics use cases can all benefit from scalable, performant data delivery through a modern storage platform. Security analytics in particular have special considerations that can be met with effective planning and deployment of data storage infrastructure.
This excerpt from O'Reillys "Understanding Log Analytics" a concise overview of the security analytics use case. Additionally, it provides a reference for performance and scalability considerations, and planning that aids the deployment and operation of data storage for security analytics.
Hardware, Server, Storage, Software, Applications, Network, Compliance, Firewall, Event Management, Malware, ERP, Firewall, Server, Storage, Email, Spam, Storage, Backups, Data Storage, SAN, Storage Hardware, Storage Systems, Cloud, Analytics, Predictive Analytics, Machine Learning, Machine Data, AIM, Artificial Intelligence, Internet of Things (IoT), IOT