Today's cyber security threats and exploits are ever increasing in complexity, both in how they are launched and detected. Log and audit data must be captured, correlated, and analyzed to determine if an event is underway. What cyber-analysts need is a common operating picture (COP) that allows them quickly and visually identify an incident so that they can begin to take the proper response and recovery actions.
ID Optimize: Security Module was developed to recognize the evolution of security products and the continuing complexity of threats. The Security Module of IDO collects all events across the network and feeds those events to the correlation, policy, devices, behavior and events. IDO can interpret in real time, security threats for non-security professionals and react according to pre-defined action plans. All of this event data can be saved and logged for in-depth analysis by trained security professionals after an event is detected and contained.