Requirements For Managing Security Information Overload

With each high profile security attack, enterprises have reacted with corresponding measures to mitigate that threat. For example, firewalls have been deployed to tighten perimeter security, Intrusion Detection Systems (IDS) have been installed to detect network and host-based intrusions and...
By Sridhar Juvvadis
August 8, 2003

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg