Is there sufficient detail contained in network device logs to support incident investigation?

book reader icon
1 Minute
facebook logo gray
linkedin logo gray
mail logo gray

Yes. In accordance to our Network Security Policy, network device and other logs are retained for as long and in such detail as indicated by all relevant compliance requirements, and are used in forensic analysis whenever necessary.

Last update 4 days ago