Security information and event management

Results: 336



#Item
11Network management / Computer security / Data security / System administration / Computer systems / SolarWinds / Security information and event management / Log management / Information security operations center / User Activity Monitoring / TriGeo Network Security

CTA_Free_Trial_Button_Green

Add to Reading List

Source URL: cdn.swcdn.net

Language: English - Date: 2015-10-20 12:51:43
12Economy / E-commerce / Information privacy / Business / Computing / Payment cards / Computer law / Payment Card Industry Data Security Standard / Payment systems / Qualified Security Assessor / Payment card industry / Data security

Responding to a Data Breach A How-to Guide for Incident Management Preparing for the worst is the best defense. This guidance will help merchants and service providers in the event of a data breach by outlining how to p

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2015-09-29 14:41:33
13Security / Prevention / Computer security / Safety / Data security / Secure communication / Computer law / Security breach notification laws / Computer security incident management / Data breach / Security information and event management / Breach

Data Breach Response Readiness: Is Your Organization Prepared?

Add to Reading List

Source URL: www.huschblackwell.com

Language: English
14Computing / Information technology management / Information technology / Network management / Artificial intelligence / Autonomic networking / Information technology governance / Network performance / Virtualization / Bremen

The International Conference on Autonomous Infrastructure Management and Security (AIMS) is a highly interactive single-track event integrating David Hausheer (University of Zurich)

Add to Reading List

Source URL: www.aims-conference.org

Language: English - Date: 2008-02-07 05:15:58
15Network management / System administration / Internet Standards / Internet protocols / Syslog / Balabit / Log management / Security information and event management / Rsyslog

PDF Document

Add to Reading List

Source URL: pages.balabit.com

Language: English - Date: 2016-02-08 21:07:03
16Data security / Computer network security / Threat / Vulnerability / Information security / Network security / Software Engineering Institute / Security information and event management / Cyber Insider Threat / Computer security / Cyberwarfare / Security

WHITE PAPER Securing the Modern Enterprise “Factory:” How to Build an Insider Threat Program. This whitepaper explores the kinds of internal users who are most

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-07-20 11:10:08
17Centralized computing / Computer law / Credit cards / Data privacy / Payment Card Industry Data Security Standard / Security information and event management / Integrated Cloud Service Management / Novell Cloud Security Service / Computer security / Computing / Cloud computing

CloudLock for ServiceNow The Cloud Security Fabric for ServiceNow & Other Cloud Apps CloudLock provides a cloud security fabric that protects your corporate assets while enabling secure cloud storage, sharing and collabo

Add to Reading List

Source URL: www.cloudlock.com

Language: English - Date: 2015-07-01 10:00:43
18Computer security / Data security / Intrusion detection system / Sguil / OSSIM / OSSEC / Security information and event management / System software / Computer network security / Software

INTRUSION DETECTION About the Course Knowledge Transfer

Add to Reading List

Source URL: www.silensec.com

Language: English - Date: 2014-04-29 06:12:38
19Network management / Computer security / System administration / Internet protocols / Internet standards / OSSEC / Security information and event management / Security event manager / Log analysis / System software / Computing / Information technology management

Silensec documents RED CHUNGU 13_07_16_v4(web)

Add to Reading List

Source URL: www.silensec.com

Language: English - Date: 2014-04-29 06:19:36
20

Security Information and Event Management (SIEM) Bescherm uw organisatie door gestructureerde real-time analyse van beveiligingsrisico’s op basis van log informatie Veiligheid van bedrijfsgegevens Bedrijfsgegevens en i

Add to Reading List

Source URL: partner.ictmedia.nl

Language: Dutch - Date: 2015-03-09 09:28:47
    UPDATE