Security event manager

Results: 175



#Item
41Computing / Information technology management / Security information and event management / Security event manager / System administration / Network management / Event Viewer / Log management and intelligence / LogLogic / Computer security / Data security / Security

BlackStratus LOG Storm SIEM Appliances Flexible and affordable, yet remarkably powerful, LOG Storm combines log management and security information management on a single easy-to-install, simple-to-use appliance. BlackSt

Add to Reading List

Source URL: www.blackstratus.com

Language: English - Date: 2014-04-08 16:03:52
42Cyberwarfare / Computing / Security information and event management / Security event manager / Security information management / Managed security service / Security controls / Federal Information Security Management Act / Sensage / Computer security / Data security / Security

Rapidly identify and resolve threats... streamline compliance... and transform volumes of security data into understandable, actionable information – all with the power of BlackStratus SIEM Storm. Your business depend

Add to Reading List

Source URL: www.blackstratus.com

Language: English - Date: 2012-05-23 09:26:07
43McAfee / Security event manager / Security / NitroSecurity / Computer security / Security information and event management / Computing

» GROUP TEST l SIEM McAfee Enterprise Security Manager (ESM) n the ever-changing marketplace of today’s network security products, it is not uncommon to see a company acquire another company with the idea of taking a

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:00:41
44Electronic commerce / Computing / Information technology management / Security information and event management / Crime prevention / National security / Security event manager / Payment Card Industry Data Security Standard / Cloud computing / Computer security / Security / Data security

Data Sheet INETU SECURITY SUITE: SIEM Knowing when changes are made to critical system files is vital to protecting your customers’ and your organization’s private information. In fact, it is so important that many

Add to Reading List

Source URL: www.inetu.net

Language: English - Date: 2014-09-19 14:35:03
45Computing / Security information and event management / Host Based Security System / McAfee / Software / McAfee VirusScan

Case Study DearBytes Builds World-Class Managed Security Services With McAfee Enterprise Security Manager

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-10 10:46:03
46Computing / Data security / System administration / Network management / Security information and event management / Accelops / Denali Alaskan Federal Credit Union / Security event manager / Information security / Computer security / Security / Information technology management

CASE STUDY Customer: Denali Alaskan Federal Credit Union Industry: Financial Services Results with AccelOps:

Add to Reading List

Source URL: pages.accelops.com

Language: English - Date: 2015-04-17 12:56:20
47Security information and event management / Computing / Security / McAfee VirusScan / Host Based Security System / McAfee / Computer security / Companies listed on the New York Stock Exchange

Data Sheet McAfee Enterprise Security Manager Discover. Respond. Comply.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-09-30 13:14:00
48Security information and event management / Security event manager / Computing / Computer security / Data security / Security

atris-siem-services-datasheet_final.indd

Add to Reading List

Source URL: www.atris.com

Language: English - Date: 2014-09-24 17:57:45
49Computing / Security information and event management / Federal Information Security Management Act / Security event manager / Cloud computing / Certification and Accreditation / Information security / Regulatory compliance / Computer security / Data security / Security

w w w. n e t f o r e n s i c s . c o m Federal Solutions Our Security Information and Event Management (SIEM) solutions provide a top layer of correlation, analysis and intelligence across the portfolio of deployed secu

Add to Reading List

Source URL: www.blackstratus.com

Language: English - Date: 2012-05-17 09:38:34
50Security / Computer network security / Rapid7 / Security information and event management / Security event manager / Malware / Cloud computing / Software / Computer security / Computing

Rapid7 UserInsight allows you to detect and investigate security incidents faster. It identifies intruders that use stealthy attack methods, such as stolen credentials and lateral movement. UserInsight is the

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2015-04-10 08:06:00
UPDATE