karose5714 karose5714 28-10-2022 Computers and Technology contestada what options are there for ingesting data from a unified threat management (utm) appliance deployed on the network edge to a siem?