siem

Results 126 - 150 of 213Sort Results By: Published Date | Title | Company Name
Published By: Recorded Future     Published Date: Feb 13, 2019
This white paper outlines current approaches to implementing SIEM and enriching security products with threat intelligence.
Tags : 
    
Recorded Future
Published By: Logrhythm     Published Date: Feb 24, 2016
This research will help you to: - Select an appropriate SIEM solution based on vendor research. - Create an implementation roadmap. - Define your SIEM architecture. - Measure the continued value of your SIEM.
Tags : 
security, security application, siem, siem architecture, it security managers, application security, security management, security policies, information management, productivity
    
Logrhythm
Published By: Logrhythm     Published Date: Feb 24, 2016
This guide focuses solely on SIEM solutions that are available as appliances that include both the hardware and software needed to deploy them.
Tags : 
security, application security, siem, siem solutions, identity management, internet security, security management, security policies, application integration
    
Logrhythm
Published By: McAfee EMEA     Published Date: Nov 15, 2017
As we have said through this paper, it is no longer an either/or choice between security analytics and SIEM. Or even between insourcing and outsourcing security monitoring. You need to establish a team with complimentary capabilities, skills, and resources; then leverage each part for what it does best. It is frustrating to use a technology for something itís not built to do, and just as frustrating to expect a service provider to do things beyond their capability ó regardless of their claims during the sales cycle. So donít do that ó build your security monitoring program to give all parties the best chance of success.
Tags : 
security, analytics, siem, monitoring, skills, capabilities, outsourcing
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Nov 15, 2017
In response to an increasingly complex IT ecosystem and expanding attack surface, Intel Security offers a unified threat defense lifecycle. Intel Security delivers an integrated, connected architecture that dramatically increases speed and capacity of organizations to prevent and respond to attacks. Our architecture reduces complexity and improves operational efficiency, providing critical integrated, adaptive, and orchestrated intelligence and response capabilities. This empowers customers to block threats more effectively, identify compromises, and implement quick remediation and stronger countermeasures.
Tags : 
security information, event management, orchestration, surface, intel security
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Atrius Health Chief Information Security Officer Chris Diguette oversees security for Atrius Health, the largest physician-led healthcare provider in the northeastern US. The organization is recognized nationally for its use of health information technology. Diguette is also CIO of the VNA Care Network, a home healthcare provider and subsidiary of Atrius Health. As CISO, Diguette and his team work to implement and maintain a security infrastructure that safeguards the organizationís critical health information systems and applications, such as its Epic Systems Electronic Medical Records (EMR) system and the personal data of more than 675,000 patients at 29 facilities in eastern and central Massachusetts.
Tags : 
artius, health, chief, information, security, officer, organization
    
McAfee EMEA
Published By: NCM Fathom     Published Date: Feb 23, 2010
The same elements of powerful storytelling that captivate us in our everyday lives can benefit companies and their brands. NCM Fathom's white paper explores how businesses can tell their story to engage audiences, build brand preference and loyalty and deliver results that meet objectives. Bold companies like Kleenex and Siemens have shared their brand's story with customers and employees in cinemas nationwide. Download the white paper to learn more.
Tags : 
ncm, fathom, revenue, branding, advertising, ad management, digital cinema network
    
NCM Fathom
Published By: EMC Corporation     Published Date: Mar 20, 2014
The status quo approach of collecting more logs from more sources won't help in detecting and responding to advanced threats. Logs are inherently limited in the level security visibility that they provide. Consider a new way of looking at SIEM.
Tags : 
emc, siem, security transformation, malware detection, malware threats, big data security platform, incident detection, advanced security analysis, security, enterprise software
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 20, 2014
To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Tags : 
emc, siem, security transformation, malware detection, malware threats, big data security platform, incident detection, advanced security analysis, security, enterprise software
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 20, 2014
Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
Tags : 
emc, siem, security transformation, malware detection, malware threats, big data security platform, incident detection, advanced security analysis, security, enterprise software
    
EMC Corporation
Published By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire Enterprise combines real-time change detection, comprehensive configuration auditing, continuous policy compliance management, and rapid configuration remediation in a single solution. By integrating these Tripwire solutions, you can correlate all suspicious events with changes to take control of threats across all events and changes.
Tags : 
tripwire enterprise, log and event management, security, compliance, configuration audit, total cost of ownership, tco, siem, auditing, enterprise software, configuration management
    
Tripwire, Inc
Published By: Tripwire, Inc     Published Date: Mar 10, 2010
The next generation of log and event management eliminates the complexity and bloat associated with traditional log and SIEM systems.
Tags : 
tripwire, log center, event management, siem system, compliance regulation, security event analysis platform, event database, integrated it security, automation, business continuity, compliance, internet security, application integration, business process automation
    
Tripwire, Inc
Published By: NetIQ     Published Date: Aug 05, 2011
In this white paper, you'll learn about how Novell Sentinel can make protecting your system against these costly security threats easy and efficient. Keep security threats out and your data safe.
Tags : 
novell, novell sentinel, netiq, bulldog solutions, identity and security, security management, siem solutions, log management, data security, access control, application security, authentication, business continuity, email security, encryption, intrusion detection, intrusion prevention, security policies, virtualization, infrastructure
    
NetIQ
Published By: McAfee     Published Date: Jan 28, 2014
SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.
Tags : 
siem, sans, endpoint, network, correlation, integration, anti spyware, anti virus, application security, disaster recovery, hacker detection, internet security, intrusion detection, intrusion prevention, security management, security policies, vulnerability management
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2014
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Tags : 
"advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense", security, it management
    
McAfee
Published By: LogRhythm     Published Date: Dec 20, 2016
For security analysts, a flow of security alerts is an inevitable consequence of the digital age. Moreover, as alerts can signal business-impacting incidents, the enterpriseís security staff cannot be complacent. Staff must be relentless in gathering logs, setting alert parameters, assessing alert severity, and then prudently responding to incidents with countermeasures.
Tags : 
security, technology, best practices, information technology, business analytics, business management
    
LogRhythm
Published By: LogRhythm     Published Date: Feb 22, 2018
Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM with advanced profiling, analytics and response features.
Tags : 
    
LogRhythm
Published By: McAfee     Published Date: Mar 31, 2017
UEBA provides added visibility within SIEM for compliance and user monitoring, improving security alerts, and more insightful investigations. Todayís most advanced security operations use the technologies together to maximize each toolís strengths.
Tags : 
ueba, uba, siem, analytics, secops, soc, threat hunting, correlation, incident response
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The OpenDXL initiative puts the power of integration and automation in the hands of security analysts by providing open source tools, expertise, and a supportive community.
Tags : 
opendxl, data exchange, open source, threat feed, threat intelligence, ioc, advanced threats, sandbox, honeypot, siem, stix
    
McAfee
Published By: McAfee     Published Date: Apr 06, 2017
Kevin O'Sullivan, Security Service Director, Kinetic IT, explains how this Australian managed security services provider relies on McAfee Enterprise Security Manager to deliver visibility of risks and threats for its customers.
Tags : 
siem, secops, security operations, threat visibility, compliance, integration
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Fragmented and siloed security infrastructure is not sustainable against todayís threats. Adopt an optimized approach that encourages collaboration and visibility across the enterprise.
Tags : 
secops, siem, soc, threat defense, continuous monitoring, remediation, response, automation, process integrations, behavioral analysis
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Infographic to accompany the "Sustainable Security Operations" white paper. It demonstrates how sustainable security operations overcomes major inhibitors.
Tags : 
secops, siem, soc, threat defense, continuous monitoring, remediation, response, automation, process integrations, behavioral analysis
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The concept of SIEM orchestration provides immediate, automated responses. It is the only way for a modern enterprise to protect against advanced attacks.
Tags : 
secops, siem, soc, orchestration, threat intelligence, epo, automation, process integration, workflow scripting
    
McAfee
Published By: McAfee     Published Date: Apr 06, 2017
There are several steps along the SOC maturity curve and different paths to get there. Join the Foundstone Services team as they discuss the elements of a modern SOC, maturity levels, and strategic options.
Tags : 
secops, soc, siem, security strategy, soc maturity, threat management, process integrations, advanced threat defense
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.