Decrypting the security mystery with SIEM - Part II 1. Security and auditing a. Guarding network perimeter: Auditing your network devices b. Securing business-critical applications: Auditing IIS & Apache web server activities c. Custom log parsing: Analyze log data from any device. 2. Building a threat intelligence platform 3. Log forensic analysis a. Backtrack security attacks with log search