Description
New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic internal to organizations and at Internet gateways. More than ever, its important for businesses to deploy new methods of monitoring and controlling these Internet-based applications in order to discover and mitigate hidden security threats.