![]() Compliance: Applications can be employed to automate the gathering of compliance data, producing reports that adapt to existing security, governance, and auditing processes. ![]() Dashboards: Tools can take event data and turn it into informational charts to aid in seeing patterns, or identifying activity that is not forming a standard pattern.Alerting can be to a dashboard or sent via third-party channels such as email. Alerting: the automated analysis of correlated events and production of alerts, to tell recipients of immediate issues.Correlation is typically a function of the Security Event Management part of a full SIEM solution This technology provides the ability to do a variety of correlation techniques to integrate different sources, to turn data into useful information. Correlation: looks for common attributes and links events together into meaningful bundles.Data aggregation: Log managementaggregates data from many sources, including network, security, servers, databases, applications, providing the ability to consolidate monitored data to help avoid missing crucial events.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |