The convergence (or not) of security and operations event monitoring

Friday, 9 July 2004, 5:23 AM EST

Event monitoring is of interest from both a security and an operations perspective, but to date they have tended to be implemented separately with different toolsets. This joint interest has given rise to vendors and enterprises exploring the convergence of these two capabilities. Although overlaps in technologies, requirements, and processes exist, significant differences remain, which will impede full convergence indefinitely.

META Trend: Threat and vulnerability management integration will accelerate through 2004. While most organizations still focus on technology problems of intrusion control and count on improved detection, correlation, and prevention capabilities, advanced organizations pursue a more process-oriented approach (introducing a business perspective), which will evolve into comprehensive vulnerability life-cycle management in 2006/07. Demand for managed security services of various types (e.g., security monitoring, customized alerts) will increase, but despite vendor consolidation, maturity will lag for many disciplines through 2005.

By Chris King, Corey Ferengul, Paul Proctor at ZDNet.

[ Read more ]




Spotlight

How to keep your contactless payments secure

Posted on 19 September 2014.  |  Fraudsters can pickpocket a victimís financial data using low-cost electronics that can fit into a rucksack. Here are the top security threats you should be aware of if youíre using a RF-based card, along with our top safety tips to keep your payments secure.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Sep 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //