Check out my latest blog post on Dark Reading’s Security Monitoring Tech Center entitled “
It is fairly common to see router, firewall and intrusion-detection system logs in addition to server, workstation and application logs consolidated within an enterprise security information management (ESIM) system. Logs generated from network-based devices are generally responsible for the bulk of logs monitored by an ESIM, with the remainder consisting of logs from the various endpoints and software deployed throughout the infrastructure. Perhaps one of the most overlooked sources of data to monitor, however, is that of the physical security controls deployed within an enterprise organization.
Read the full blog entry here: http://www.darkreading.com/security_monitoring/blog/archives/2010/10/dragging_physic.html