02 Jul Logstash and Maxmind – Not Just for GEOIP Anymore
farren , labelle – 2 weeks and i still cannot get technical support on the phone. – Sucks!!!!
Internal network descriptive information, such as segment and subnet, stored in IPAM or another network management tool;
Information on individual internal endpoints, such as sensitivity, criticality, known vulnerabilities, compliance status, machine state;
Threat intelligence on external IP addresses, derived from sources such as MISP, including severity, exploit type, intelligence reliability, and aging.