- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎01-30-2019 01:22 PM
Checking to see if there is an architecture diagram for Security Operations that shows all applications for Security Incident Response, VR, Threat Management, Configuration Compliance and Trusted Security Circles.
Solved! Go to Solution.

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎02-02-2019 08:15 AM
Hi,
This is probably the best publicly available source that can get you started. This link is from the Champion Enablement site, which I think is a pretty good resource.
Please mark this as correct or helpful so others can benefit from our conversation.

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎02-02-2019 08:15 AM
Hi,
This is probably the best publicly available source that can get you started. This link is from the Champion Enablement site, which I think is a pretty good resource.
Please mark this as correct or helpful so others can benefit from our conversation.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎02-18-2019 10:32 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎07-25-2023 11:25 AM
@Chris McDevitt is there an updated link to this type of architecture diagram? I'm being asked to provide this exact same thing. The link from 2019 is broken. Thank you!