Historically, corporate security teams have focused the majority of their efforts and budgets on perimeter security systems: firewalls, network-based intrusion detection systems (IDSs), and virtual private network (VPN) servers. But by themselves, perimeter systems present a very skewed image of malicious or damaging activity on a corporate network.
Thinking Inside the Box: The Importance of Real-Time Log Monitoring for Network Security
Posted April 30, 2002 | |
Don’t have a login?
Make one! It’s free and gives you access to all Cutter research.