Summary
Here, we got an understanding of the various engines that are part of MDIoT. All these detection engines contribute to the continuous monitoring of any threat vectors aimed at any organization’s OT or IoT network or devices. These five engines provide ways to identify attacks and alert you about any attack coming the organization’s way.
In the next chapter, we will interpret alerts in vulnerability management and threat monitoring.