Recognizing North Korea and Kim Jong-un’s recent actions as probable bluster has parallels to assessing a rogue computer process or questionable user activity on a network. When a process goes wrong in a system, log monitoring software gives off a real-time alert as a warning. With a less-than-enterprise class solution, this alert might be all that happens, which forces systems administrators to decide on an action based on isolated, incomplete information. With lives at stake rather than system and network resources, the result could be tragic.
Context is Key for Real Understanding
The U.S. government has the benefit of a sophisticated infrastructure providing correlated analysis of any situation from multiple angles. The direct threats from North Korea are correlated with data on their lack of actual troop movements, no missile facilities preparations, and in context of historical data of frequent threats right around national holidays. Similar to the U.S. government, a true enterprise-class log management and data analytics system should enable IT managers to have a fully informed view of any specific event with all the pertinent information available at once to enable fully intelligent action. [Read more...]