Data monitoring and active analytics
Data monitoring and active analytics are two well-known system protection capabilities; therefore, a good security defense must have a monitoring solution and analytics functionality to allow protection. To reliably perform data monitoring and analytics for TI or security defense, we assume that a certain number of requirements have been met, including the following:
- Data location: You know where critical assets reside (on-premises, in the cloud, in structured shared folders, and on employees' endpoints).
- Catalogue: You keep records of all critical data sources (frontend applications, servers, and their information).
- Data existence: Ensure that you know about the existence of all critical data, as you cannot monitor critical data if you do not know of its existence or location.
Data monitoring (including network monitoring) allows you and the organization to evaluate whether the system is running as it should be....