A company was recently breached, Part of the company's new cybersecurity strategy is to centralize the logs
from all security devices. Which of the following components forwards the logs to a central source?
A. Log enrichment
B. Log aggregation
C. Log parser
D. Log collector
from all security devices. Which of the following components forwards the logs to a central source?
A. Log enrichment
B. Log aggregation
C. Log parser
D. Log collector