Continuous Security Monitoring

By: Qualys
Qualys

Continuous Monitoring has become an overused and overhyped term in security circles, driven by US Government mandate (now called Continuous Diagnostics and Mitigation). But that doesn’t change the fact that monitoring needs to be a cornerstone of your security program, within the context of a risk-based paradigm. This paper from Securosis discusses Continuous Security Monitoring, including how to do it, and the most applicable use cases they have seen in the real world. It also provides a step-by-step guide for things to do for each use case to move forward with a monitoring initiative.

Tags : qualys, securosis, secuirty monitoring, continuous monitoring, continuous security monitoring, cms< security, security programs, risk management, csm platform, use cases, attacks, change control, compliance, security


* Please enter your email address and click the Download Now button to download the white paper.

 Email this page
Published:  Nov 05, 2013
Length:  43
Type:  White Paper