Securosis Report: Security Analytics: Team of Rivals
Any single approach to security monitoring cannot satisfy all requirements. Security analysts need a set of complementary technologies which can coexist.
Any single approach to security monitoring cannot satisfy all requirements. Security analysts need a set of complementary technologies which can coexist.