Which solution is employed to collect and analyze security-related data from various hardware and software sources in order to identify unusual patterns and alert on potential security incidents?
Automated Vulnerability Scanning tool
Intrusion Prevention System (IPS)
Security Information and Event Management (SIEM)
Unified Threat Management (UTM)