Up
Previous Next

Sheriff CSM™

System Overview

This is a basic overview of Sheriff CSM as it is deployed and used in your environment. Individual subjects covered in the System Overview include the following:
  • About Sheriff CSM — describes current risks in the business environment due to security threats and vulnerabilities, the role of risk assessment, an overview of Sheriff CSM security management capabilities for organizations to assess and mitigate risks, to detect threats and prioritize response, and to achieve compliance.

  • About Sheriff CSM System Architecture and Components — provides description of the Sheriff CSM architecture, including major system components and functionality.

  • Sheriff CSM Deployments — provides description of best practices for installation and configuration of Sheriff CSM.

  • Event Collection, Processing, and Correlation Workflow — describes the overall Sheriff CSM workflow, from collection of raw log data from networked devices to analyzing and determining risk from various threats and vulnerabilities.
Topic revision: r10 - 13 Mar 2021, SheriffCyberSecurity
Copyright 2020 Sheriff Cyber Security, LLC. All rights reserved.