Watch the short introductory videos and learn more about our solution.
Watch the short introductory videos and learn more about our solution.
The short answer is that the SECagent is not required unless the system or device you need to monitor is unable to send events using one of the numerous protocols typically used by network management platforms.
The first thing to do when you want to acquire continuous visibility to improve your network security is to collect all the information needed. Why? Just imagine that your IDS has detected an attack against one of your servers.
Leveraging this Architecture, dedicate some SECmanage systems for specific tasks such as reporting, correlating, binding, alerting, archiving, parsing, analyzing, etc…
Audit all targeted servers and enables the monitoring of user rights and privileges :