PDF - Angenommene Version frei zugänglich ab 15.7.25 (363kB) - Nur für Mitarbeiter des Archivs |
- URN zum Zitieren dieses Dokuments:
- urn:nbn:de:bvb:355-epub-586583
Zusammenfassung
Enterprises rely on Identity and Access Management (IAM) systems as their primary solution for digital identity management and access control. While regulatory compliance is often a driving factor for such systems, they also serve as an essential security gate fortifying the defense against cyber attacks. However, when analyzing suspected or actual attacks, Security Information and Event ...
Nur für Besitzer und Autoren: Kontrollseite des Eintrags