Trending Security Monitoring Discussions

Follow

Ask the Community


Ask any professional question and get answers from other specialists.

Stream language
Gourab Mitra's image
Question added by Gourab Mitra Manager IT Project Program and Delivery Management(Full Time Contract/Consulting Role) IXTEL(ixtel.com)
9 years ago
Answers:
9
Followers:
Views:
381
Vote Count:
2
Answer should contain a minimum of 25 characters.
أبراهيم al-mahiaoi's image
Question added by أبراهيم al-mahiaoi
7 years ago

أبحث وضيفه في جده مشرف على مدار الساعه او مراقب في جميع أوقات الدوام ؟‎

انا شاب جاد سعودي من جده أبحث عن وضيفه مشرف او مراقب موقع او حاله وانا مستعد أكون على مدار اليوم أقيم الحاله واراقب الموقع وقادر على المراقبه المتنكره والتجسس على الحاله ‎ ... See More

Answers:
0
Followers:
Views:
55
Vote Count:
0
Answer should contain a minimum of 25 characters.
Mohanad Kabil's image
Question added by Mohanad Kabil IT Technician Shell Egypt
9 years ago
Answers:
3
Followers:
Views:
134
Vote Count:
0
Answer should contain a minimum of 25 characters.
أبراهيم al-mahiaoi's image
Question added by أبراهيم al-mahiaoi
7 years ago

أبحث وضيفه في جده مشرف على مدار الساعه او مراقب في جميع أوقات الدوام ؟‎

انا شاب جاد سعودي من جده أبحث عن وضيفه مشرف او مراقب موقع او حاله وانا مستعد أكون على مدار اليوم أقيم الحاله واراقب الموقع وقادر على المراقبه المتنكره والتجسس على الحاله ‎ ... See More

Answers:
0
Followers:
Views:
33
Vote Count:
0
Answer should contain a minimum of 25 characters.
Wissam Khabbaz's image
Question added by Wissam Khabbaz Manager cyber security architecture Abu Dhabi Islamic Bank
7 years ago
Answers:
1
Followers:
Views:
4
Vote Count:
0
Answer should contain a minimum of 25 characters.
ناصرالدين قريبي's image  
Answer added by  ناصرالدين قريبي, أستاذ مساعد, جامعة الجزائر 3
8 years ago

FENCE DETECTION SYSTEMS Next-generation fence-mounted sensors that detect cut or climb attempts and pinpoint intrusion attempts to within 3m / 10f

mohammed alaa borji's image  
Answer added by  mohammed alaa borji, CISO, Confidentiel
9 years ago

in Soc you must have many level: 1- classic : firewall , Ips, Ids ... 2- SIEM 3- some tools to monitor network devices,server  and services 4- LDAP ... 

Pushpendra Chavan's image  
Answer added by  Pushpendra Chavan, Technical Support Engineer, Red Hat Software Services (India) Pvt. Ltd., Pune
9 years ago

If you ask me, I would suggest to watch out the following things so closely on routine basis.   1. Changes in the filesystem : This will let you know that nothing unusual ... See More

Rasheed Kilany's image  
Answer added by  Rasheed Kilany, IT Specialist / Consultant , Parsons Overseas Limited
6 years ago

Yes can be hacked ther is not 100% Security

Gokul Mannu's image  
Answer added by  Gokul Mannu, Senior Network Security Engineer, WIPRO LLC
6 years ago

a) Scalable Analytics Engine b) Consolidated warehouse for security data or cross indexed series of data stores. c) Centralized Management dashboard d) Pattern based thre ... See More