Security Event Management
May 7, 2010Security Event Management
Proactively discover and detect intrusive activities/vulnerabilities
Provide real-time prevention
Provide a multi-layered approach to intrusion defense (Host/Network)
Correlation & Visualization
Integrate any event from the enterprise
Collect, consolidate, and normalize events across the enterprise
Filter events, alert and notify personnel, execute countermeasures
Response, Reporting – Forensics
Suppress meaningless data
Correlate events to accurately identify critical security incidents
Provide visual management – dashboard
Vulnerability Management
Provide structured incident response
Prioritize and measure detection and resolution capabilities
Identify and analyze important security trends and preserve data for forensics
www.bestitdocuments.com