The new EnergySec white paper, “What Information to Collect at the Network Perimeter,” is the second in our series on Network Perimeter Defense. This paper provides guidance on what information to collect in order to make your monitoring and logging program more beneficial.
Executive Summary: There is an almost never-ending supply of information that can be collected by network perimeter security devices. The purpose of this white paper is not to list all of those pieces of information. Rather, the purpose is to highlight some of the most important types of information which should be collected and spotlight where, how, and why to collect that information. After reading this paper, you should have an expanded view of what constitutes a network perimeter and what information should be collected from devices on that perimeter.Download “Network Perimeter Defense: What Information to Collect at the Network Perimeter”