A company recently had a security audit in which the auditors identified multiple potential threats. These potential threats can cause usage pattern changes such as DNS access peak, abnormal instance traffic, abnormal network interface traffic, and unusual Amazon S3 API calls. The threats can come from different sources and can occur at any time. The company needs to implement a solution to continuously monitor its system and identify all these incoming threats in near-real time.
Which solution will meet these requirements?
tainh
Highly Voted 2 years, 6 months agoWilson_S
2 years, 5 months agoGreen53
Most Recent 1 year, 11 months agoToptip
2 years agoITGURU51
2 years, 1 month agojishrajesh
2 years, 5 months agoSubs2021
2 years, 5 months agoD2
2 years, 6 months agoAdamWest
2 years, 6 months agoShriraj32
2 years, 6 months ago