Security information and event management

Results: 336



#Item
1

Malicious Threat Detection 3 reasons why you want to integrate breach detection into a SIEM solution Many companies rely on a Security Information and Event Management (SIEM)

Add to Reading List

Source URL: www.redsocks.eu

Language: English - Date: 2018-08-06 04:35:01
    2Data security / Audit / Security information and event management / Log management / Computer security / Linoma Software / Check Point

    NEWS For Immediate Release Enforcive releases Enforcive/Enterprise Security version 8 including allnew Compliance Assessment and IFS Auditing (Hackensack, New Jersey and Herzliyah, Israel- November 18, 2013) Enforcive, a

    Add to Reading List

    Source URL: www.enforcive.com

    Language: English - Date: 2013-11-26 00:45:21
    3Computer security / Computer network security / E-commerce / Cybercrime / EMC Corporation / RSA Security / Information security operations center / Security information and event management / Threat / RSA / Phishing / Draft:Threat Intelligence Analyst

    RSA ADVANCED SECURITY OPERATIONS CENTER SOLUTION Pervasive Visibility, Rapid Detection, Effective Response OVERVIEW and behavior analysis models to detect and

    Add to Reading List

    Source URL: i.crn.com

    Language: English - Date: 2016-06-29 17:01:32
    4Computer forensics / FireEye / Cyberwarfare / Computer network security / Data security / Secure communication / Security information and event management / Computer security / Cloud computing / Network tap

    THREAT ANALYTICS PLATFORM: CLOUD COLLECTOR EVENT GENERATOR THAT SECURELY CREATES AND STREAMS EVENT DATA TO THE FIREEYE THREAT ANALYTICS PLATFORM (TAP) OV E R V I E W

    Add to Reading List

    Source URL: www.fireeye.jp

    Language: English - Date: 2016-06-24 18:23:18
    5Network management / System administration / Crime prevention / National security / Secure communication / Logfile / Login / Syslog / Computer security / Security information and event management / Log analysis / Windows Security Log

    PDF Document

    Add to Reading List

    Source URL: its.sjsu.edu

    Language: English - Date: 2015-12-07 11:43:06
    6Computer network security / Computer security / AlienVault / OSSIM / Cyberwarfare / Data security / Cryptography / Security information and event management / Unix / Vulnerability / Threat

    UNIX AS A SECOND LANGUAGE By Sandra Henry-Stocker TOOLS Learning AlienVault ITworld | November 2, 2014

    Add to Reading List

    Source URL: www.alienvault.com

    Language: English - Date: 2016-01-25 18:50:34
    7Computer security / Computer network security / Data security / Cryptography / National security / Information security operations center / Information security / Payment Card Industry Data Security Standard / Security information and event management / Intrusion detection system / Security / Threat

    THREAT DETECT DIAGRAM v10 CTP copy

    Add to Reading List

    Source URL: www.redscan.com

    Language: English - Date: 2016-03-21 10:46:55
    8Data security / Crime prevention / Cryptography / Information governance / National security / Regulatory compliance / Audit / Computer security / Internal audit / Business process management / Vulnerability / Security information and event management

    A FORESITE WHITE PAPER THE ART AND SCIENCE OF COMPLIANCE INTRODUCTION Today, regulatory and legislative compliance obligations seem endless and ever-changing. Corporations are faced with enormous challenges

    Add to Reading List

    Source URL: foresite.com

    Language: English - Date: 2016-02-17 15:35:27
    9Information technology management / Computing / Security / Data security / Crime prevention / Cryptography / Information governance / National security / SolarWinds / Security information and event management / Information security / Computer security

    c a s e stu dy LegacyTexas Bank LegacyTexas Bank is a full-service community bank serving businesses and families

    Add to Reading List

    Source URL: solarwinds-marketing.s3.amazonaws.com

    Language: English - Date: 2011-11-07 16:07:35
    10Data management / Sqrrl / Business intelligence / Distributed computing architecture / Big data / NoSQL / Security information and event management / Analytics / Apache Accumulo / User behavior analytics

        DATASHEET SQRRL ENTERPRISE BIG DATA SECURITY ANALYTICS USE CASE

    Add to Reading List

    Source URL: sqrrl.com

    Language: English - Date: 2014-10-07 15:54:16
    UPDATE