An organization would like to implement a solution that will correlate and analyze security log data to help them identify threats. Which strategy is appropriate for this organization?
A customer is experiencing image-based spam and phishing attacks that are negatively impacting messaging flow. Which Symantec solution should be recommended to this customer?
Which information does an organization need to analyze in order to apply a risk-based approach to their security and compliance practices, according to the Security Solutions 1.0 course?