Identify the three features referred to as “table stakes” for Security Information and Event Management (SIEM).
Select one that applies, and then click Submit.
- Detection, Application Monitoring, and User and Entity Behavior Analytics (UEBA)
- Search, Application Monitoring, and Statistical Normalization
- Search, Detection, and Visualization
- Visualization, Vulnerability Management, and User and Entity Behavior Analytics (UEBA)