A company recently had a security audit in which the auditors identified multiple potential threats. These potential threats can cause usage pattern changes such as DNS access peak, abnormal instance traffic, abnormal network interface traffic, and unusual Amazon S3 API calls. The threats can come from different sources and can occur at any time. The company needs to implement a solution to continuously monitor its system and identify all these incoming threats in near-real time.
Which solution will meet these requirements?
100fold
Highly Voted 11 months, 3 weeks agojd_aws
Most Recent 1 month agoRaphaello
8 months agosmanzana
8 months, 2 weeks agoDaniel76
10 months, 1 week agoAamee
10 months, 1 week ago