Networking Investigate

Continuous Monitoring: Responding to New Threats in More Complex IT Environments

Download now Free registration required

Executive Summary

As organizations today face the challenge of protecting their valuable data, they must balance that protection with giving business users and customers access to the data. Yet the threat environment now has more complex, persistent attackers alongside the usual suspects. The computing environment is more complex, too, with services and storage outsourced to the cloud, virtualized infrastructure, and more IT assets in the infrastructure than ever before. The U.S. Federal Government has focused substantially on the practice of continuous monitoring as a means of providing this much-needed balance between data protection and data access. While guidance for this practice is mostly coming out of the public sector, private industry can benefit it as well.

In this white paper, learn more about continuous monitoring, including:

  • What it is and why it is needed
  • The guidelines available for implementing it
  • Who cares about using it--and why
  • The capabilities of a strong continuous monitoring solution
  • Format: PDF
  • Size: 0 KB