OC12mon
Defense-in-Depth Needed for Security Management
End-host defense mechanisms (e.g. host firewalls, application wrappers)
Ubiquitous network monitoring at aggregation points
(e.g. DMZ's and up-stream ISP's)
- dynamic filtering and data collection
- security policy compliance monitoring
- security policy enforcement
Investigative tools and evidence collection needed for
high-performance network links.