Security information and event management

Results: 336



#Item
251Companies listed on the New York Stock Exchange / Event correlation / Security information and event management / Correlation and dependence / Technology / McAfee VirusScan / ACARM-ng / McAfee / Computing / Computer security

Data Sheet McAfee Advanced Correlation Engine Detect threats based on what you value Key Advantages

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:52:35
252Security information and event management / Computing / Security / McAfee VirusScan / Host Based Security System / McAfee / Computer security / Companies listed on the New York Stock Exchange

Data Sheet McAfee Enterprise Security Manager Discover. Respond. Comply.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-09-30 13:14:00
253Cyberwarfare / Anti-spam / Proofpoint /  Inc. / Spam filtering / Antivirus software / Threat / Security information and event management / Malware / Computer security / Computer network security / Security

Proofpoint Threat Response Summary Benefits of Threat Response Proofpoint Threat Response is the first threat management platform to automate

Add to Reading List

Source URL: www.proofpoint.com

Language: English - Date: 2014-08-25 14:11:52
254Finance / EMV / Debit card / Smart card / Payment card / Interac / Automated teller machine / Card security code / MasterCard / Payment systems / Business / Money

For acquirers, effective end-to-end event management should entail: — S haring information about known security vulnerabilities of software and payment devices that have led to past data compromises

Add to Reading List

Source URL: www.mastercard.com

Language: English - Date: 2010-11-11 01:11:53
255Data security / Computer network security / McAfee / Companies listed on the New York Stock Exchange / Security information and event management / Vulnerability / Asset / Threat / Host Based Security System / Computer security / Security / Cyberwarfare

Solution Brief McAfee Security Management Get proactive—coordinate operations with real-time intelligence McAfee Security Management

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:54
256Security event manager / Database activity monitoring / Computing / Computer security / Security information and event management / McAfee

Solution Brief SIEM: Five Requirements that Solve the Bigger Business Issues

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-09-05 13:17:36
257Computing / Computer network security / Security information and event management / Managed security service / Cyberwarfare / Host Based Security System / McAfee VirusScan / McAfee / Computer security / Companies listed on the New York Stock Exchange

Solution Brief McAfee Enterprise Security Manager Services solutions for Managed Service Providers (MSPs) McAfee® Enterprise Security Manager offers the advanced scalability, flexibility, and

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-04-23 22:01:26
258Computing / Computer network security / Security information and event management / Managed security service / Cyberwarfare / Host Based Security System / McAfee VirusScan / McAfee / Computer security / Companies listed on the New York Stock Exchange

Solution Brief McAfee Enterprise Security Manager Services solutions for Managed Service Providers (MSPs) McAfee® Enterprise Security Manager offers the advanced scalability, flexibility, and

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-04-23 22:01:26
259Companies listed on the New York Stock Exchange / Event correlation / Security information and event management / Correlation and dependence / Technology / McAfee VirusScan / ACARM-ng / McAfee / Computing / Computer security

Data Sheet McAfee Advanced Correlation Engine Detect threats based on what you value Key Advantages

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:52:35
260Data mining / Intrusion detection system / Anomaly / Recall / Denial-of-service attack / Mind / Computing / Information technology management / Computer network security / Data security / Anomaly detection

SECOND IEEE-SMC INFORMATION ASSURANCE WORKSHOP, WEST POINT, NEW YORK, JUNE 5-6, [removed]Event Recognition Beyond Signature and Anomaly Jon Doyle, Isaac Kohane, William Long, Howard Shrobe, and Peter Szolovits

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2001-03-23 12:19:38
UPDATE