Security information and event management

Results: 336



#Item
81Software / Data management / Database activity monitoring / Database audit / Database security / Database / Sentrigo / Security information and event management / Microsoft SQL Server / Computing / Database management systems / Relational database management systems

Securosis, L.L.C. Understanding and Selecting a Database Activity Monitoring Solution By Rich Mogull

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2011-12-01 09:44:11
82Data security / Cyberwarfare / Crime prevention / National security / Security information and event management / Managed security service / Security information management / Computer network security / Security / Computer security

Huntsman Security Enters U.S. Market; Unveils First DefenseGrade Solution to Consolidate Legacy Security Data International IT security software company launching Silicon Valley operations with $10 million in funding San

Add to Reading List

Source URL: www.tier-3.com

Language: English - Date: 2015-04-17 04:54:26
83Computer network security / Abusehelper / Communication software / Threat / Vulnerability / Naukowa i Akademicka Sieć Komputerowa / Security information and event management / Network security / Cyberwarfare / Security / Computer security

Proactive Detection and Automated Exchange of Network Security Incidents Piotr Kijewski NASK / CERT Polska

Add to Reading List

Source URL: www.cert.pl

Language: English - Date: 2013-01-31 07:14:55
84Safety / Actuarial science / Security / Occupational safety and health / Emergency management / Insurance / Job safety analysis / Event management / Information technology audit process / Management / Risk / Risk management

FACT SHEET Event Management Each year Catholic entities hold public events for the enjoyment of their parishioners and the broader community.

Add to Reading List

Source URL: www.ccinsurance.org.au

Language: English - Date: 2013-06-05 20:31:56
85Companies listed on the New York Stock Exchange / Event correlation / Security information and event management / Correlation and dependence / McAfee VirusScan / McAfee / Computing / Computer security

Data Sheet McAfee Advanced Correlation Engine Detect threats based on what you value

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-10-28 16:29:53
86Computing / SecureWorks / Managed security service / Symantec / Security event manager / Magic Quadrant / Security operations center / Security information and event management / MSS / Computer security / Computer network security / Cyberwarfare

Magic Quadrant for Managed Security Services, Worldwide

Add to Reading List

Source URL: www.secureworks.com

Language: English - Date: 2015-01-21 09:17:00
87McAfee / Network management / System administration / Data security / Security information and event management / Security event manager / Log analysis / Syslog / Payment Card Industry Data Security Standard / Computing / Information technology management / Computer security

Data Sheet McAfee Enterprise Log Manager Reduce compliance costs with automated log collection,

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-03-13 18:46:38
88Security / Computer network security / Rapid7 / Security information and event management / Security event manager / Malware / Cloud computing / Software / Computer security / Computing

Rapid7 UserInsight allows you to detect and investigate security incidents faster. It identifies intruders that use stealthy attack methods, such as stolen credentials and lateral movement. UserInsight is the

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2015-04-10 08:06:00
89Business software / Dashboard / Computing / Information technology / Computer security / Data security / Security information and event management

Threat and Event Console Reporting Increase Detection and Response against Malware Already on Your Network iboss Threat and Event Console Reporting provides unrivaled insight into all the Internet traffic on your network

Add to Reading List

Source URL: www.iboss.com

Language: English - Date: 2015-04-20 16:19:40
90Information Technology Infrastructure Library / Configuration management database / IT service management / Information security / Event correlation / Reliability engineering / Information technology management / Computing / Systems engineering

PinkVERIFY™ 2011 ITSM Tool Assessment Criteria Availability Management Purpose: “…[E]nsure that the level of availability delivered in all IT services meets the agreed availability needs and/or service level target

Add to Reading List

Source URL: www.pinkelephant.com

Language: English - Date: 2014-10-08 21:00:15
UPDATE