A company was recently breached Part of the company’s new cybersecurity strategy is to centralize the logs from all security devices.
Which of the following components forwards the logs to a central source?
A . Log enrichment
B . Log aggregation
C . Log parser
D . Log collector
Answer: C