Written by Administrator
| All organizations have taken measures to limit the risks regarding information security. There are firewalls installed, Antivirus software installed, there are access rules introduced, Servers and applications are 'hardened' etc.
Moreover, often each part of this information security stronghold applies to a certain amount of control. However, through the diversity to the measures and the amount of LOG information that each of the solution can generate, it is impossible to assess this information properly on security risks.
A system that collects (aggregation) LOG information from various components of the infrastructure and still some incidents associated (correlation) with each other offers many advantages. These systems fall under the heading Security Information & Event Management.