Security information and event management

Results: 336



#Item
261System software / Information technology management / Data security / Network management / System administration / Security information and event management / Security event manager / Windows Management Instrumentation / Event Viewer / Computer security / Computing / McAfee

Data Sheet McAfee Collector Plug-in Gather Microsoft Windows logs without WMI Key Advantages

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-09-05 13:27:09
262Security / Disaster preparedness / Humanitarian aid / Occupational safety and health / British Columbia Ambulance Service / Emergency / Public safety / Management / Emergency management

. INFORMATION BULLETIN Free Event Demonstrates How Families can be Prepared for an Emergency Abbotsford, May 1, 2013 – In an emergency situation, having a plan may help

Add to Reading List

Source URL: www.abbotsford.ca

Language: English - Date: 2013-05-02 17:54:45
263Emergency management / Computer security / Data management / Disaster recovery / Information Risk Management / Business continuity planning / Information security / Business continuity / Backup / Data security / Public safety / Security

BUSINESS RECOVERY PLAN SUMMARY Ensuring business continuity in the event of a significant interruption or disaster is of critical importance at Union Bank. Policies, procedures, and processes are in place to ensure that

Add to Reading List

Source URL: www.collegecounts529.com

Language: English - Date: 2014-06-13 15:00:18
264Internet / Denial-of-service attack / Security information and event management / Managed security service / Email / Computer network security / Computing / Cyberwarfare

State of California Statewide Technology Procurement Division Verizon IFB STPD[removed]B

Add to Reading List

Source URL: www.verizonenterprise.com

Language: English - Date: 2014-06-25 11:13:51
265Data privacy / Information technology management / Risk analysis / Health Insurance Portability and Accountability Act / Information security / Chief information security officer / Payment Card Industry Data Security Standard / Asset / Privacy Office of the U.S. Department of Homeland Security / Computer security / Security / Data security

    Information Security Incident & Breach Handling Procedure 1. Introduction An information technology (IT) security incident is an event involving an IT resource at University of

Add to Reading List

Source URL: info.alaska.edu

Language: English - Date: 2014-06-09 20:07:31
266National security / Federal Information Security Management Act / Information security / Chief information security officer / Security information and event management / Security controls / Managed Trusted Internet Protocol Service / Computer security / Data security / Security

Microsoft Word - Document1

Add to Reading List

Source URL: www.cms.gov

Language: English - Date: 2012-08-02 13:10:53
267Computer security / Data security / Security information and event management

State of California Statewide Technology Procurement Division IFB STPD[removed]B SOW Catalog B

Add to Reading List

Source URL: ebiznet.sbc.com

Language: English - Date: 2014-06-30 14:13:35
268Companies listed on the New York Stock Exchange / Event correlation / Security information and event management / Correlation and dependence / Technology / McAfee VirusScan / ACARM-ng / McAfee / Computing / Computer security

Data Sheet McAfee Advanced Correlation Engine Detect threats based on what you value Key Advantages

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:52:35
269Information security / Event Viewer / Access control / Log management and intelligence / Log analysis / Computer security / Security / Public safety

Level 3 – Public Use Page 1 of 5 Information Technology Log/Event Management Guidelines

Add to Reading List

Source URL: www.csun.edu

Language: English - Date: 2012-10-11 13:30:51
270Cyberwarfare / Computer network security / Software testing / Security information and event management / Information security / Security controls / Vulnerability / Security awareness / Computer security / Data security / Security

OFFICE OF INFORMATION SECURITY 2 CONTROLS AND COMPLIANCE (OISC ) GOALS FOR 2013 

Add to Reading List

Source URL: www.technology.wv.gov

Language: English - Date: 2013-03-28 11:29:56
UPDATE