Minimum configuration: ATA has the required security intelligence built in. Therefore, there's no need for rule or policy setup to detect security threats. The configuration itself is straightforward. Ongoing maintenance is also minimal.
Easy alerts: With ATA, there are no more reports and logs to analyze. The system itself does all the data analysis and informs us about critical alerts, either as email alerts or in the form of an attack timeline in the web interface. If you've worked with products such as System Center Operation Manager (SCOM), you may know how sensitive alerting can distract you from the real issues. ATA minimizes false alarms and lets people know exactly what they want to know.
Equipped with knowledge to ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.