Continuous Security Monitoring offers a proactive approach to security risk management, but not all solutions are same. Most vendors simply increase the frequency of periodic scans. A more effective solution integrates periodic and real-time monitoring along with log analysis to detect advanced threats and address challenges introduced by mobile, virtual, and cloud technologies.
In this whitepaper, Securosis President, Mike Rothman, drills into three use cases - Attacker, Change Control, and Compliance to illustrate the benefits of continuous security monitoring and how vendors address them.
“You should supplement active discovery with a passive discovery capability that monitors network traffic and identifies new devices, traffic to malicious sites, and unauthorized communications…”
- Mike Rothman