A company recently had a security audit in which the auditors identified multiple potential threats. These potential threats can cause usage pattern changes such as DNS access peak, abnormal instance traffic, abnormal network interface traffic, and unusual Amazon S3 API calls. The threats can come from different sources and can occur at any time. The company needs to implement a solution to continuously monitor its system and identify all these incoming threats in near-real time.
Which solution will meet these requirements?
100fold
Highly Voted 1 year, 4 months ago723993f
Most Recent 3 months, 1 week ago[Removed]
6 months agoRaphaello
1 year agosmanzana
1 year, 1 month agoDaniel76
1 year, 3 months agoAamee
1 year, 3 months ago