Many components are necessary to build a complete technological environment:
• Firewalls,
• IPSs/IDSs,
• Breach detection solutions,
• Probes,

​Effective and efficient data collection is fundamental for a successful
• CSOC. Following data types must be collected, correlated and analyzed from a security perspective.
• Data flows
• Telemetry,
• Packet captures,
• Syslog
• Several types of events

​Data enrichment and information about vulnerabilities affecting the entire ecosystem to be monitored are of great importance as well.

Back to Top
Close Zoom