Security information and event management

Results: 336



#Item
31Public safety / Crime prevention / National security / Computer network security / Security information and event management / Information security / Penetration test / SANS Institute / Security / Data security / Computer security

About the Speaker Andrew Hay Senior Security Research Lead & Evangelist, OpenDNS Andrew Hay is the Senior Security Research Lead & Evangelist at OpenDNS where he leads the research efforts for the company. Prior to joini

Add to Reading List

Source URL: cloudsecurityworld.homestead.com

Language: English - Date: 2014-10-29 10:41:12
32Data security / Data privacy / Computer law / Credit cards / Qualys / Cloud computing / Security information and event management / Information security / Payment Card Industry Data Security Standard / Computer security / Computing / Security

Continuous Security Monitoring Version 1.5

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2013-09-26 16:55:26
33Security / Security information and event management / Network security / Security event manager / Neural network / Sensage / LogLogic / Check Point / Anomaly detection / Data security / Computer security / Computing

Enhanced Security and Compliance through Neural Data Analysis A white paper by Privacyware Published by:

Add to Reading List

Source URL: www.privacyware.com

Language: English - Date: 2010-06-01 05:18:16
34Auditing / Password / Security information and event management / Single sign-on / Information technology security audit / Privileged password management / Web Access Management / Security / Computer security / Computer network security

DATASHEET MULTIPLE SYSTEMS ADMINISTRATOR Centralized Management of IBM i Servers

Add to Reading List

Source URL: static.helpsystems.com

Language: English - Date: 2014-02-04 11:49:13
35Cloud computing / Computer network security / Security information and event management / Managed security service / IBM cloud computing / Clone Systems /  Inc. / Computing / Centralized computing / Computer security

PDF Document

Add to Reading List

Source URL: www.solutionary.com

Language: English - Date: 2014-04-09 15:10:09
36Computer security / Sourcefire / Management / Security information and event management / Managed services / Snort / Service provider / Business / Software / Computer network security

PDF Document

Add to Reading List

Source URL: www.emulex.com

Language: English
37Cyber-Ark / Malware / Principle of least privilege / Privileged Identity Management / Security information and event management / Privilege / Access control / Ring / Database activity monitoring / Computer security / Security / Computing

PDF Document

Add to Reading List

Source URL: www.edvance.com.hk

Language: English - Date: 2014-09-04 04:59:36
38Data security / Imperva / Cyberwarfare / Data loss prevention software / Database activity monitoring / File system / Security information and event management / File manager / Computer file / Computer security / Computer network security / Computing

PDF Document

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2011-12-01 09:44:13
39Security information and event management / Network security / Privilege / Computing / Privileged Identity Management / Database activity monitoring / Computer security / Security / Principle of least privilege

WHITE PAPER Privileged Users: Superman or Superthreat? A Privileged User Risk Whitepaper.

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:34
40Computing / Software / Computer security / McAfee VirusScan / Security information and event management / Intel / Network security / LinuxShield / Host Based Security System / McAfee / Antivirus software / System software

PDF Document

Add to Reading List

Source URL: community.mcafee.com

Language: English - Date: 2015-05-11 05:24:08
UPDATE