O'Reilly logo

Security Threat Mitigation and Response: Understanding Cisco Security MARS by Greg Abelar, Dale Tesch

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 1. Understanding SIM and STM

<feature><title></title>

This chapter covers the following topics:

</feature>

For a CxO, Security Manager, or Network Security Professional involved in today’s industry, there is a growing need to understand the security information management (SIM) and security threat mitigation (STM) technologies. To most readers, it is apparent why security networking equipment is needed, but it is not obvious how to manage the vast amounts of data they produce.

In this chapter, you are introduced to SIM and STM technologies. STM technology is relatively new and is a subset of SIM. You will discover how both ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required