Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

Can it accept data from other security-management products, databases or third-party systems?

0
Posted

Can it accept data from other security-management products, databases or third-party systems?

0

SIM products will be critical components of larger enterprise risk-management strategies, and IT managers today need to know the data collected by unified threat management, antispyware and vulnerability-management products, to name a few, can be incorporated into the SIM intelligent event-correlation and -analysis engines. Customers should compel vendors to specify what kind of data and how much data across the enterprise the security tools can collect and correlate. IT managers should ask what third-party products the vendor supports and whether they have software developer kits available for customers to build their own integrations, if need be. For example, “the ability to integrate vulnerability data from a vulnerability-scanning engine to help it set the severity of events based on the device’s vulnerability to the threat” is a must-have feature, Gabriel says. 4. Can the product generate alerts in real-time based on complex events? It’s a given that SIM products work to collect a

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123