What administration process is required to secure an application and manage Primary Response?
The Primary Response administrator deploys Primary Response Agents to selected servers and designates the applications to profile. This can be accomplished in minutes from the Primary Response Management Console. Once the agents are deployed, applications have out-of-the- box protection from code injection and buffer overflow attacks. The agents automatically profile application behavior in order to detect and prevent additional types of attacks. There are no rules to tune and no signature libraries to keep up-to-date.