Get started Bring yourself up to speed with our introductory content.

How will you gather the data from the remote management platform?

After planning the architecture, the next step is to gather data from the host of different sources. From individual security devices to firewall and IDS data, it is necessary to accumulate all of the data.

How will you gather the data?

About the Author
Dr. Paul Rohmeyer is a faculty member at Stevens Institute of Technology, an independent security consultant focusing on enterprise IT risk management, and a frequent speaker at security and audit industry events. He has advised numerous financial, telecommunications and pharmaceutical companies in the development of secure network architectures.

Once there is understanding of the architecture, attention will turn towards designing an appropriate method of data gathering. The provider will need to identify data they will gather from individual security devices, as well as data that will be taken directly from the management architecture. This includes firewall and IDS data, and perhaps event log data from critical servers as well.

Dig Deeper on MSPs and cybersecurity

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.