Access your Pro+ Content below.
Lessons and next steps in continuous security monitoring
Sponsored by SearchSecurity.com
Network visibility is both crucial for enterprise security and difficult to achieve. Organizations have implemented various technologies to allow for continuous security monitoring (CSM), and the U.S. government has also, in recent years, launched its own effort. This three-part guide looks in-depth at the federal effort known as Continuous Diagnostics and Mitigation (CDM), which offers an excellent basis, our expert authors say, for an enterprise-level continuous monitoring strategy. But technological advances -- including the current hybrid cloud environment -- mean that security efforts cannot be static.
Continuous security monitoring is a must and information security professionals must keep abreast of government efforts, the threat landscape, and the available technologies and services available to defense enterprise systems and data. This guide reviews developments of the past few years in terms of CSM and CDM, and looks ahead to help InfoSec pros adapt and advance their security monitoring efforts.
Table Of Contents
- How the Federal CDM program applies to enterprises
- The challenges hybrid cloud brings to network visibility
- Perfecting your continuous monitoring strategy in a hybrid era
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
More PRO+ ContentView All