Remove 2003 Remove Firewall Remove Unstructured Data
article thumbnail

The Evolution of SIEM: Where It’s Been and Where It is Going

CyberSecurity Insiders

Back then, it was about ingesting data and kicking off alerts from all the cybersecurity products that were being used –– mostly host- and network-based intrusion detection devices (ISS et al), network tools, and firewalls (Check Point, Cisco, et al). Endpoint and anti-virus software would come a little later.

Marketing 116