An organization is struggling to differentiate threats from normal traffic and access to systems. A security
engineer has been asked to recommend a system that will aggregate data and provide metrics that will assist in identifying malicious actors or other anomalous activity throughout the environment. Which of the following solutions should the engineer recommend?
Currently there are no comments in this discussion, be the first to comment!