Downloads provided by UsageCounts
Nowadays every organization is exposed to the intrinsic risks associated to the use of Information Technology. Cyber threats are more powerful and dangerous all the time. Data breaches cost organizations millions of euros every year. Therefore, they must prepare and protect infrastructures for such attacks even anticipating them if possible. A SIEM implements a set of technologies able to help detect, respond, and neutralize cyber threats. The main objective is to give an organization a global vision of IT security, allowing to have its complete control. By collecting and managing information about events that take place it is easier to detect trends and focus on anomalies. But the cost involved in purchasing, deploying, and customizing a commercial SIEM is high and beyond the budget of many organizations. This document is not intended to be an in-depth dissertation about the matter, rather it is a starting point that gives organizations with limited budgets ideas on how to use the Elastic Stack or the OpenSearch project, based on the experience of the ProTego.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 40 | |
| downloads | 42 |

Views provided by UsageCounts
Downloads provided by UsageCounts