Outcome Based Security Monitoring in a Continuous Monitoring World

Technology has advanced sufficiently enough such that vulnerability management can be performed in near real-time at large scale. Because of this, outcome based security monitoring for large enterprises is now possible with “big data” types of analytics. This paper goes into five detailed steps for achieving continuous monitoring.