............................................................................ platforms take the log files, find commonalities (such as attack types and threat origination), and summarize the results for a particular time period.
For example, all logs and alerts from all IDSs, perimeter firewalls, personal firewalls, antivirus scanners, and operating systems can be tied together.
Events from all logs are then gathered, analysed, and reported on from one location.