Security information and event management

Results: 336



#Item
301Computer network security / Computing / National security / Crime prevention / Information security / Network security / Security information and event management / Firewall / Data security / Computer security / Security

Data Sheet Managed Firewall Service About SilverSky

Add to Reading List

Source URL: www.silversky.com

Language: English - Date: 2013-06-20 10:10:39
302Prevention / Public safety / Security information and event management / Network security / Information security / TriGeo Network Security / Computer security / Data security / Security

Data Sheet Event Monitoring and Response Effective network security requires vigilant

Add to Reading List

Source URL: www.silversky.com

Language: English - Date: 2013-06-19 22:52:22
303Security / Information technology management / Database activity monitoring / Operating system / File system / Security information and event management / Telecommunications data retention / Computer file / Information technology audit / Computing / Computer security / Data security

Whitepaper Auditing Unstructured Data Identity-Aware Storage, File Activity Monitoring, and Compliance Reporting Across Platforms • ...

Add to Reading List

Source URL: www.criticism.com

Language: English - Date: 2012-03-30 15:07:14
304Data security / Data management / Database activity monitoring / File system / Relational database management systems / Security information and event management / Database / Vormetric / Linoma Software / Software / Computing / Database management systems

Monitoring Unstructured Data

Add to Reading List

Source URL: www.criticism.com

Language: English - Date: 2012-03-30 15:07:12
305Corporate Emergency Access System / Management / Second responder / Security / Public safety / Access control

For More Information Contact: CEAS Program CEAS is an Access Control System, which pre-authenticates critical private sector employees before an event occurs for access to restricted areas and roadways following a disas

Add to Reading List

Source URL: ceas.com

Language: English - Date: 2013-02-11 16:55:27
306Security information and event management / Geography of Europe / Europe / Geography of the Netherlands / Computer security / Rotterdam / Security event manager

Siem Broekhuis April 10th, 1943 – November 10th, 2013 Siem Broekhuis was born in a two-room apartment in the south of Rotterdam, not far from the Unilever factory where his parents, Siem and Sjaan (Adriana de Ru

Add to Reading List

Source URL: www.maxbenlily.com

Language: English - Date: 2013-11-16 15:54:27
307Crime prevention / National security / Data security / Computing / Information security / Network Access Control / Security information and event management / McAfee / TriGeo Network Security / Security / Computer network security / Computer security

[removed]Converted].eps

Add to Reading List

Source URL: media.scmagazine.com

Language: English - Date: 2014-05-20 17:45:18
308Computer network security / Data security / Security information and event management / Department of Defense Information Assurance Certification and Accreditation Process / Situation awareness / Network security / Threat / Vulnerability / EMASS / Computer security / Cyberwarfare / Security

CYBERC4:ALERT REAL-TIME CYBER SITUATIONAL AWARENESS FOR SATELLITE GROUND NETWORKS Overview As satellite networks move toward end-to-end Internet Protocol (IP) environments, the attack-surface for cyber-threats is increas

Add to Reading List

Source URL: www.rtlogic.com

Language: English - Date: 2013-12-04 16:32:44
309Security / Computer network security / Software testing / Vulnerability / Attack / Security information and event management / European Telecommunications Standards Institute / Information security management system / Threat / Computer security / Cyberwarfare / Data security

ETSI GS ISI 004 V1[removed]Group Specification Information Security Indicators (ISI); Guidelines for event detection implementation

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2013-12-20 09:35:07
310Information technology management / System administration / Computer systems / Data security / Security information and event management / Antivirus software / Security event manager / Malware / Log analysis / Computing / Computer security / System software

RSA White Paper SIEM: Moving Beyond Compliance Dr. Anton Chuvakin @ Security Warrior Consulting

Add to Reading List

Source URL: www.securitywarriorconsulting.com

Language: English - Date: 2013-09-26 18:15:13
UPDATE