intrusion management

The centralized management of intrusion-based security technologies to identify, manage, and mitigate network intrusions based on security policy.