Services TECHNOLOGY
Many components are necessary to build a complete technological environment:
• Firewalls,
• IPSs/IDSs,
• Breach detection solutions,
• Probes,
• SIEM
Effective and efficient data collection is fundamental for a successful
• CSOC. Following data types must be collected, correlated and analyzed from a security
perspective.
• Data flows
• Telemetry,
• Packet captures,
• Syslog
• Several types of events
Data enrichment and information about vulnerabilities affecting the entire ecosystem to
be monitored are of great importance as well.