Folks,
I would like some recommendations on log analysis or forensics
methods. Obviously log collection isn't enough without some form of
analysis after the fact.
There are some interesting products on the horizon like the one
offered by www.netforensics.com but currently they only support the
Cisco PIX.
Cheers,
----
Jeff Newton
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================