Review of current architectural challenges, design, and licensing scheme.
Challenges with the existing architecture.
Challenges with scalability provided by the existing solution.
Following is a subset of our checklist:
- Log source not sending logs
- Search Efficiency missing
- Lack of asset inventory and discovery
- Fine tune expensive and global rules
- Missing log verification and completeness
- Unsupported log source
- Lack of communication in integration and dismantling log source
- Integration of SIEM with security Tools
- Enforce and activate SLA
- Compatibility with log source
- Performance (CPU,RAM, services, Custom rule engine, Event collector)
- Rules fine tune
- Application integrations
- Database integration
- Creation of DSM
- Insufficient policy and standard
- Asset criticality
- Flows is not sufficient
- Criticality of service must be defined
- No IP schema
Please send an email to email@example.com with your specific challenges and requirements.