Security information and event management

Results: 336



#Item
291Computer security / Data security / Security information and event management

Project Charter Project Name: 5.1.1.E – LBR Issue – Security Event Log Monitoring Business Objective: The SSRC is mandated, per F.S. 71A-1, to provide certain security services (vulnerability identification, intrusi

Add to Reading List

Source URL: ssrc.myflorida.com

Language: English - Date: 2012-09-28 15:26:41
292Ens /  Flevoland / Energy conservation / Energy service company / Security information and event management

....... Tribal Business Development and Financing    siem ens sans bold

Add to Reading List

Source URL: apps1.eere.energy.gov

Language: English - Date: 2008-01-08 12:07:23
293Emergency management / Computer security / Data management / Disaster recovery / Information Risk Management / Business continuity planning / Information security / Business continuity / Backup / Data security / Public safety / Security

BUSINESS RECOVERY PLAN SUMMARY Ensuring business continuity in the event of a significant interruption or disaster is of critical importance at Union Bank. Policies, procedures, and processes are in place to ensure that

Add to Reading List

Source URL: www.collegecounts529advisor.com

Language: English - Date: 2014-06-13 14:44:10
294Security / Security event manager / Database activity monitoring / Computing / Computer security / Security information and event management / McAfee

Solution Brief SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-06-03 16:59:10
295Distributed computing / System administration / Data security / Security information and event management / Security event manager / Data center / Log monitor / Computer security / Computing / Concurrent computing

Strategy # 5 – Data Center IT / Infrastructure 5.1.1E Security Event Log Monitoring SOUTHWOOD SHARED

Add to Reading List

Source URL: ssrc.myflorida.com

Language: English - Date: 2013-07-02 09:57:07
296Auditing / Public safety / Prevention / Information technology security audit / Management / Health Insurance Portability and Accountability Act / Information security / Audit / Security information and event management / Computer security / Security / Data security

Logging and Auditing in a Healthcare Environment Mac McMillan CEO CynergisTek, Inc. OCR/NIST HIPAA Security Rule Conference Safeguarding Health Information: Building Confidence

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-05-13 01:00:00
297Security / Log analysis / Server log / Security information and event management / Information security / Network security / Log / Proxy server / Log management and intelligence / Computer security / Computing / Data security

Centre for the Protection of National Infrastructure Effective Log Management Author: Tom Goldsmith Context Ref: [removed]CPNI-CTX - Effective Log Management

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-05-16 06:14:27
298Data security / System software / Log analysis / Network security / Server log / Proxy server / Security information and event management / Telecommunications data retention / Keystroke logging / Computer security / Computing / Security

Effective Log Management www.contextis.com About Introduction

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-05-16 06:14:12
299Emergency management / Computer security / Data management / Disaster recovery / Information Risk Management / Business continuity planning / Information security / Business continuity / Backup / Data security / Public safety / Security

BUSINESS RECOVERY PLAN SUMMARY Ensuring business continuity in the event of a significant interruption or disaster is of critical importance at Union Bank. Policies, procedures, and processes are in place to ensure that

Add to Reading List

Source URL: www.collegecounts529.com

Language: English - Date: 2014-06-13 15:00:18
300Cyberwarfare / Information security / Security controls / Security information and event management / Vulnerability / Enterprise information security architecture / Cyber security standards / Computer security / Security / Data security

The Heart of the Matter: A Core Services Taxonomy for State IT Security Programs NASCIO Staff Contact:

Add to Reading List

Source URL: www.nascio.org

Language: English - Date: 2011-10-26 12:48:42
UPDATE