Chapter 5. Comparing Physical & Logical Security Events—A U.S. Government Agency

 

“In God We Trust, all others we monitor.”

 
 --Intercept Operator’s motto

Several times in this book, I’ve mentioned the extensibility of ESM. I’ve offered various examples addressing a multitude of security products, network devices, operating systems, applications, databases and telephone systems. Perhaps no category receives as much attention or “cool value” as correlation between physical security devices and logical network devices. Maybe this is because this category has a certain James Bond allure to it. That is, being able to track what somebody is doing in the real world against what he or she is doing in the virtual world does have a certain Hollywood feel. ...

Get Enemy at the Water Cooler now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.