Skip to main content

Security Visibility in the Enterprise

One of the first steps that any organization must take in order to reduce risk and improve overall security is to understand the activity that is taking place on their networks and computer systems. These activities are recorded in the log files these systems produce. As these systems have grown in speed and complexity, understanding this activity has become increasingly difficult.

35442 (PDF, 2.93MB)

19 Sep 2014
ByJim Hendrick
Share
All papers are copyrighted

No re-posting of papers is permitted

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.