NSM Validation: Rock Your Socs Off (RYSO)

Security operations depends on a stream of events, some provided by IDS, netflow, full packet capture, firewalls, proxies and the like. Ensuring that users are seeing what they think they should see in spite of a changing network topology and unpredictable utilization can be tricky.

Provided by: SecurityTube.net Topic: Networking Date Added: Nov 2015 Format: Webcast

Find By Topic