One Article Review

Accueil - L'article:
Source NetworkWorld.webp Network World
Identifiant 334028
Date de publication 2017-03-10 07:18:00 (vue: 2017-03-10 07:18:00)
Titre IBM\'s position on Security Analytics and Operations (SOAPA)
Texte Just what is a security operations and analytics platform architecture (SOAPA) anyway? In the past, most enterprises anchored their security analytics and operations with one common tool: Security Information and Event Management (SIEM) systems. Now, SIEM still plays a major role here, but many organizations are supplementing their security operations centers (SOCs) with additional data, analytics tools and operations management systems. We now see SOCs as a nexus for things like endpoint detection and response tools (EDR), network analytics, threat intelligence platforms (TIPs) and incident response platforms (IRPs). In aggregate, security operations is changing, driven by a wave of new types of sensors, diverse data sources, analytics tools and operational requirements. And these changes are driving an evolution from monolithic security technologies to a more comprehensive event-driven software architecture along the lines of SOA 2.0, where disparate security technologies connected with middleware for things like data exchange, message queueing and business-level trigger conditions. To read this article in full or to leave a comment, please click here
Envoyé Oui
Condensat additional aggregate along analytics anchored anyway architecture are article business but centers changes changing click comment common comprehensive conditions connected data detection disparate diverse driven driving edr endpoint enterprises event evolution exchange from full here ibm incident information intelligence irps just leave level like lines major management many message middleware monolithic more most network new nexus now one operational operations organizations past platform platforms plays please position queueing read requirements response role security see sensors siem soa soapa socs software sources supplementing systems technologies these things threat tips tool: tools trigger types wave what where â in â to
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: