Folks,

I would like some recommendations on log analysis or forensics 
methods.  Obviously log collection isn't enough without some form of
analysis after the fact.

There are some interesting products on the horizon like the one 
offered by www.netforensics.com but currently they only support the
Cisco PIX.

Cheers,

----
Jeff Newton




================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to