Articles

Apache Kafka became the de facto standard for processing data in motion across enterprises and industries. Cybersecurity is a key success factor across all use cases. Kafka is not just used as a backbone and source of truth for data. It also monitors, correlates, and proactively acts on events from real-time and batch data sources to detect anomalies and respond to incidents. This blog series explores use cases and architectures for Kafka in the cybersecurity space, including situational awareness, threat intelligence, forensics, air-gapped and zero trust environments, and SIEM/SOAR modernization. This post is part six: SIEM/SOAR Modernization.

Blog Series: Apache Kafka for Cybersecurity

This blog series explores why security features such as RBAC, encryption, and audit logs are only the foundation of a secure event streaming infrastructure. Learn about use cases,  architectures, and reference deployments for Kafka in the cybersecurity space:

Source de l’article sur DZONE


Introduction

Also called endpoint protection in the world of network security, endpoint security describes the practices and methodologies adopted for the safeguarding of corporate computer systems and networks that can be remotely accessed via wireless gadgets (called client devices), such as laptops, mobiles, desktops, tablets, notebooks and the like.

General components of an endpoint security system include client software and security software. The former is installed separately on every wireless device that is employed to access the corporate network from a remote location. Security software, on the other hand, is a part of the security system that is positioned on a gateway or server and which can be accessed and managed centrally.

Source de l’article sur DZONE