Through better utilization of identity, system log, and real-time security event information, higher levels of IT security and regulatory compliance can be reached while related costs are cut, says Novell's Ben Goodman. Commentary - Through better utilization of identity, system log, and real-time security event information, higher levels of...
Click
here to read the full article.