Back to Results
First PageMeta Content
Cyberwarfare / Computer network security / Secure communication / National security / McAfee / Security information and event management / Data loss prevention software / Network security / Security event manager / Computer security / Security / Data security


Technology Blueprint InvestigatE Data Breaches Collect, analyze, and preserve security forensic information
Add to Reading List

Document Date: 2014-01-10 01:04:53


Open Document

File Size: 1,21 MB

Share Result on Facebook

City

Santa Clara / /

Company

Sun Microsystems / Oracle / ePO / McAfee ESM / Symantec / AOL / Yahoo / /

Country

United States / /

Event

FDA Phase / /

Facility

Network Security Institute / /

IndustryTerm

security infrastructure / purpose computing platforms / policy compliance auditing / asset / endpoint security solution / detail-driven relational data mining / web upload contents / applied electronics / endpoint security products / forensic tools / web application / database technologies / search strings / incident reporting solutions / inline network / finance / project management / Web Access / security management solutions / social media / web gateways / partner solutions / forensic dissection tools / corporate network / security management tools / capture technology / leadingedge technology firms / security solutions / proper infrastructure / /

NaturalFeature

Ohio Valley / /

OperatingSystem

Unix / L3 / Microsoft Windows / /

Organization

Security Innovation Alliance / System and Network Security Institute / McAfee Global Threat Intelligence / /

Person

File Sharing (Gnutella) / /

/

Position

board member / Manager / McAfee / vice president / forensic investigator / senior sales engineer / Enterprise Security Manager / Author / Manager for the NSP / Network Security Manager / administrator / vice president of the Cleveland Ohio ISSA chapter / /

Product

P2P / /

ProvinceOrState

California / /

Technology

RAM / firstgeneration log-scraping SIEM technologies / generation SIEM technologies / Unix / disk encryption / MAC address / DLP capture technology / P2P / operating system / laser / firewall / HTTP / data mining / early SIEM technology / DLP / SIEM technology / existing database technologies / network protocols / /

URL

http /

SocialTag