官术网_书友最值得收藏!

Overcoming the historical challenges

IT application support specialists and application architects have a demanding job with high expectations. Not only are they tasked with moving new and innovative projects into place for the business, but they also have to also keep currently deployed applications up and running as smoothly as possible. Today's applications are significantly more complicated than ever before—they are highly componentized, distributed, and possibly virtualized. They could be developed using Agile, or by an outsourced team. Plus, they are most likely constantly changing. Some DevOps teams claim they can typically make more than a hundred changes per day to a live production system. Trying to understand a modern application's health and behavior is like a mechanic trying to inspect an automobile while it is moving.

IT security operations analysts have similar struggles in keeping up with day-to-day operations, but they obviously have a different focus of keeping the enterprise secure and mitigating emerging threats. Hackers, malware, and rogue insiders have become so ubiquitous and sophisticated that the prevailing wisdom is that there is no longer a question of if an organization will be compromised—it's more of a question of when they will find out about it. Clearly, knowing about it as early as possible (before too much damage is done) is much more preferable than learning about it for the first time from law enforcement or the evening news.

So, how can they be helped? Is the crux of the problem that application experts and security analysts lack access to data to help them do their job effectively? Actually, in most cases, it is the exact opposite. Many IT organizations are drowning in data.

主站蜘蛛池模板: 广东省| 芒康县| 潼南县| 婺源县| 青州市| 任丘市| 当涂县| 天镇县| 柞水县| 仙居县| 东莞市| 宣威市| 赤水市| 枞阳县| 陆丰市| 邯郸县| 隆回县| 特克斯县| 寻乌县| 南部县| 手机| 石渠县| 大名县| 永清县| 长子县| 文登市| 攀枝花市| 固安县| 北京市| 肇源县| 九江市| 遂平县| 江永县| 武胜县| 梅州市| 喀什市| 寻乌县| 民和| 大厂| 板桥市| 封开县|