next up previous contents
Next: 5.1.6 Embedded security and Up: 5.1 Features of the Previous: 5.1.4 Extensibility

5.1.5 Integration

Existing applications and mechanisms can be integrated into the security system by writing back-end processors and letting them communicate through the standardized interfaces. Various security engines can interact to correlate events and aggregate information on a higher level, like in the case of a network attack followed by host intrusion. Moreover, several security management services can cooperate to guard assets that are locally dispersed. They could potentially work together to detect attacks on large scale networks.



(c) 1998, Filip Schepers