What is your primary use case for DNIF?

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

22 Answers

author avatar
Top 10Real User

We have integrated all our network devices, our servers, and our applications as well as some customized applications. We use the solution to collect the logs. We track items such as unsuccessful logins, any identical opening identification, repeated use of passwords within a certain timeframe, unsuccessful login attempts, etc.

author avatar
Top 20Real User

We are a security operation center and we implement and manage DNIF for clients. As a SIEM solution, it collects logs not only from network devices like firewalls, servers, databases, switches, or routers, but it also collects logs from applications. The use case is that we can develop very complex correlation rules, correlating the application logs and the device logs. It enables us to detect fraud within organizations by correlating multiple logs from multiple data sources.

Find out what your peers are saying about NETMONASTERY, Splunk, IBM and others in Log Management. Updated: August 2020.
439,184 professionals have used our research since 2012.