How Do You Lock Down The Network?
Submitted by Rick Saia on
Key Sources Of Security Insight
Nearly a third of respondents cited syslogs as the primary method for detecting security issues, followed by long-term packet capture and analysis (23 percent), tracking performance anomalies (16 percent), and simple network management protocol (15 percent).