An organization is struggling to differentiate threats from normal traffic and access to systems A security engineer has been asked to recommend a system that will aggregate data and provide metrics that will assist in Identifying malicious actors or other anomalous activity throughout the environment.
Which of the following solutions should the engineer recommend?
A . Web application firewall
B . SIEM
C . IPS
D . UTM
E . File integrity monitor
Answer: B