Thinking Inside the Box: The Importance of Real-Time Log Monitoring for Network Security

Posted April 30, 2002 | |

Historically, corporate security teams have focused the majority of their efforts and budgets on perimeter security systems: firewalls, network-based intrusion detection systems (IDSs), and virtual private network (VPN) servers. But by themselves, perimeter systems present a very skewed image of malicious or damaging activity on a corporate network.

About The Author
Tina Schneier
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.