1.1 Challenges of Securing an IT Environment

Securing your IT environment is a challenge due to the complexity of your environment. There are many different applications, databases, mainframes, workstations, and servers that all have logs of events. You also have the security devices and network infrastructure devices that all contain logs of what is happening in your IT environment.

Figure 1-1 What Happens in Your Environment

The challenges arise because of the following facts:

To make the information useful, you must be able to perform the following:

After you understand the challenges of securing your IT environment, you need to determine how to secure the enterprise for and from users without treating them like malicious users, or burdening them to the point where it is impossible to be productive. Sentinel provides the solution.