Chapter 1. Understanding SIM and STM
This chapter covers the following topics:
</feature>For a CxO, Security Manager, or Network Security Professional involved in today’s industry, there is a growing need to understand the security information management (SIM) and security threat mitigation (STM) technologies. To most readers, it is apparent why security networking equipment is needed, but it is not obvious how to manage the vast amounts of data they produce.
In this chapter, you are introduced to SIM and STM technologies. STM technology is relatively new and is a subset of SIM. You will discover how both ...
Get Security Threat Mitigation and Response: Understanding Cisco Security MARS now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.