Repository: incubator-spot
Updated Branches:
  refs/heads/asf-site c8b988172 -> 4d87f03ae


Adding the correct branding, adding Apache Spot (incubating) to blog entry 
Using NetFlows to Detect Threats to  Critical Infrastructure


Project: http://git-wip-us.apache.org/repos/asf/incubator-spot/repo
Commit: http://git-wip-us.apache.org/repos/asf/incubator-spot/commit/4d87f03a
Tree: http://git-wip-us.apache.org/repos/asf/incubator-spot/tree/4d87f03a
Diff: http://git-wip-us.apache.org/repos/asf/incubator-spot/diff/4d87f03a

Branch: refs/heads/asf-site
Commit: 4d87f03ae249bda486195a59f5453b0611af9a00
Parents: c8b9881
Author: Cesar <ce...@apache.org>
Authored: Mon Oct 17 23:35:33 2016 -0500
Committer: Cesar <ce...@apache.org>
Committed: Mon Oct 17 23:35:33 2016 -0500

----------------------------------------------------------------------
 .../index.html                                        | 14 +++++++-------
 1 file changed, 7 insertions(+), 7 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/incubator-spot/blob/4d87f03a/apache-spot-and-cybersecurity-using-netflows-to-detect-threats-to-critical-infrastructure/index.html
----------------------------------------------------------------------
diff --git 
a/apache-spot-and-cybersecurity-using-netflows-to-detect-threats-to-critical-infrastructure/index.html
 
b/apache-spot-and-cybersecurity-using-netflows-to-detect-threats-to-critical-infrastructure/index.html
index 11fb459..f764e54 100644
--- 
a/apache-spot-and-cybersecurity-using-netflows-to-detect-threats-to-critical-infrastructure/index.html
+++ 
b/apache-spot-and-cybersecurity-using-netflows-to-detect-threats-to-critical-infrastructure/index.html
@@ -31,9 +31,9 @@
 
         <link rel='dns-prefetch' href='//fonts.googleapis.com' />
         <link rel='dns-prefetch' href='//s.w.org' />
-        <link rel="alternate" type="application/rss+xml" title="Apache Spot 
&raquo; Feed" href="../feed/" />
-        <link rel="alternate" type="application/rss+xml" title="Apache Spot 
&raquo; Comments Feed" href="../comments/feed/" />
-        <link rel="alternate" type="application/rss+xml" title="Apache Spot 
&raquo; Apache Spot and Cybersecurity — Using NetFlows to Detect Threats to  
Critical Infrastructure Comments Feed" 
href="../open-network-insight-oni-and-cybersecurity-using-netflows-to-detect-threats-to-critical-infrastructure/feed/"
 />
+        <link rel="alternate" type="application/rss+xml" title="Apache Spot 
(Incubating) &raquo; Feed" href="../feed/" />
+        <link rel="alternate" type="application/rss+xml" title="Apache Spot 
(Incubating) &raquo; Comments Feed" href="../comments/feed/" />
+        <link rel="alternate" type="application/rss+xml" title="Apache Spot 
(Incubating) &raquo; Apache Spot (Incubating) and Cybersecurity — Using 
NetFlows to Detect Threats to  Critical Infrastructure Comments Feed" 
href="../open-network-insight-oni-and-cybersecurity-using-netflows-to-detect-threats-to-critical-infrastructure/feed/"
 />
         <script type="text/javascript">
                        window._wpemojiSettings = {
                                "baseUrl" : 
"https:\/\/s.w.org\/images\/core\/emoji\/2\/72x72\/",
@@ -222,16 +222,16 @@
                                     First idea: Use NetFlow, which is a 
network protocol that helps us collect IP traffic information and monitor 
network traffic. NetFlow has the details on the communications of all of your 
network traffic. However, the normal data on an enterprise environment includes 
billions of NetFlow events per day. To use this data to identify issues, it 
must be stored and analyzed. Storage alone is costly. Analyzing what amount Big 
Data stores is an entire other challenge.
                                 </p>
                                 <p>
-                                    Apache Spot offers a solution. It was 
designed to gather, store and analyze Big Data. In fact, Apache Spot is an 
ideal solution for this cybersecurity challenge. Apache Spot can integrate many 
different data sources in a data lake then add operational context to the data 
by linking configuration, inventory, service databases and other data stores. 
This helps you to prioritize the actions to take under different attack, 
malware, APT and hacking scenarios. With Apache Spot, attacks that bypass our 
external or internal security controls can be identified. By delivering 
risk-prioritized, actionable insights, Apache Spot can support the growing need 
for security analytics.
+                                    Apache Spot (Incubating) offers a 
solution. It was designed to gather, store and analyze Big Data. In fact, 
Apache Spot (Incubating) is an ideal solution for this cybersecurity challenge. 
Apache Spot (Incubating) can integrate many different data sources in a data 
lake then add operational context to the data by linking configuration, 
inventory, service databases and other data stores. This helps you to 
prioritize the actions to take under different attack, malware, APT and hacking 
scenarios. With Apache Spot (Incubating), attacks that bypass our external or 
internal security controls can be identified. By delivering risk-prioritized, 
actionable insights, Apache Spot (Incubating) can support the growing need for 
security analytics.
                                 </p>
                                 <p>
-                                    Not only can Apache Spot collect, store 
and analyze billions of NetFlow packets, but it can also be adapted to meet the 
unique requirements of your organization. How? Apache Spot is an open-source 
project.
+                                    Not only can Apache Spot (Incubating) 
collect, store and analyze billions of NetFlow packets, but it can also be 
adapted to meet the unique requirements of your organization. How? Apache Spot 
(Incubating) is an open-source project.
                                 </p>
                                 <p>
                                     <strong>But Wait, There’s More</strong>
                                 </p>
                                 <p>
-                                    Check out “<a 
href="../how-apache-spot-helps-create-well-stocked-data-lakes-and-catch-powerful-insights/"><u>How
 Apache Spot Helps Create Well-Stocked Data Lakes and Catch Powerful 
Insights</u></a>” to learn more about the underlying Apache Spot architecture.
+                                    Check out “<a 
href="../how-apache-spot-helps-create-well-stocked-data-lakes-and-catch-powerful-insights/"><u>How
 Apache Spot (Incubating) Helps Create Well-Stocked Data Lakes and Catch 
Powerful Insights</u></a>” to learn more about the underlying Apache Spot 
(Incubating) architecture.
                                 </p>
                                 <p>
                                     This is the first of a series of blogs 
that we will be writing about cybersecurity, so check back to read more.
@@ -293,7 +293,7 @@
 
                     <nav role="navigation"></nav>
                     <p class="source-org copyright" style="text-align:center;">
-                        &copy; 2016 Apache Spot.
+                        &copy; 2016 Apache Spot (Incubating).
                     </p>
 
                 </div>

Reply via email to