siem

Results 176 - 200 of 213Sort Results By: Published Date | Title | Company Name
Published By: Q1 Labs     Published Date: Feb 01, 2012
Is it time? Are you waving the white flag? Has your first gen SIEM failed to meet expectations despite your investment? If you are questioning whether your existing product or service can get the job done, you are not alone. Read this Securosis white paper to learn how easy it can be to replace your SIEM with a next generation solution.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
In this study, IANS interviewed two Q1 Labs customers using QRadar to assess their Return On Security (ROS). The two customers were providers of service to the U.S. Government and had highly secure environments dealing with extremely sensitive data. The data yielded from the interviews showed substantial benefit to the organizations for the cost, both in money and staff time.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, continuous monitoring, access control, network security appliance, data protection, vulnerability management
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
Read this whitepaper to learn how adopting a next generation SIEM solution provides security intelligence, to allow organizations to maintain comprehensive and cost-effective information security.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, access control, authentication, identity management, internet security, intrusion prevention, data protection
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : 
siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, pci compliance, log management, log data, log management solution, access control, identity management, internet security, intrusion detection
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : 
wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, log management solution, threat detection, fraud prevention, risk management
    
Q1 Labs
Published By: AlienVault     Published Date: Jul 16, 2014
AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of The 451 Group, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : 
alienvault, alienvault usm, security operations center, smb, javvad malik, the 451 group, siem, security-savvy smb, networking, security, it management
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
AlienVault is on a mission to change how organizations detect & mitigate threats - affordably & simply. Our USM solution delivers complete security visibility in a fraction of the time of traditional SIEM. So, you can go from installation to insight in days, not months. Download the 2014 Gartner MQ for SIEM.
Tags : 
mitigate, threats, detect, affordability, solution, deliver, security, visibility, siem, quadrant, it management
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable "AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of 451 Research, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : 
security, operations, affordability, av labs, open threat, exchange, analyst, report, research, competitive, landscape, it management
    
AlienVault
Published By: AlienVault     Published Date: Aug 13, 2015
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Tags : 
alienvault, security, siem, hacking, threat detection, hacker detection, internet security, intrusion detection, security management, vulnerability management
    
AlienVault
Published By: AlienVault     Published Date: Aug 13, 2015
The 2015 Magic Quadrant summarizes Gartner’s yearly analysis of the SIEM market and compares the positions of leading competitors like AlienVault. Get Gartner's complete analysis of each SIEM vendor, and learn what makes AlienVault a Visionary. Download the 2015 report.
Tags : 
alienvault, security, siem, hacking, threat detection, monitoring, anti virus, application security, vulnerability management
    
AlienVault
Published By: AlienVault     Published Date: Nov 10, 2015
Analysis of the SIEM market.
Tags : 
analysis, competitors, visionary, market, report, best practices, business analytics, business intelligence, business management, productivity
    
AlienVault
Published By: AlienVault     Published Date: Nov 10, 2015
Learn about the changing SIEM market and Alienvault's SMB-focused approach to SIEM.
Tags : 
security, smbs, network, cyber threats, security budgets, enterprise, security management, best practices, business intelligence, business management
    
AlienVault
Published By: Symantec     Published Date: Nov 30, 2015
Independientemente de que se trate de una persona o una empresa, usted se debe encargar de la seguridad online de la misma manera en que se encarga de la seguridad física en su hogar o su empresa. No solo le hará sentir más seguro, sino que además protege a las personas que visitan su hogar, el lugar de trabajo oel sitio web. Es importante comprender los riesgos potenciales y asegurarse deestar totalmente protegido contra ellos. En el vertiginoso mundo de la tecnología, no siempre es sencillo mantenerse al día con los avances más recientes. Por este motivo, es aconsejable asociarse con una empresa de seguridad en Internet de buena reputación.
Tags : 
    
Symantec
Published By: Norse     Published Date: Apr 10, 2014
Learn the benefits of leveraging threat intelligence in security monitoring and see the protection it can give you against advance threats and malware.
Tags : 
norse, threat intelligence, malware, security, threats, malware analysis, protection, big data, siem, breaches
    
Norse
Published By: AlienVault     Published Date: Mar 30, 2016
The Magic Quadrant summarizes Gartner’s yearly analysis of the SIEM market and compares the positions of leading competitors like AlienVault. Get Gartner's complete analysis of each SIEM vendor, and learn what makes AlienVault a Visionary. View the latest report.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
The promise of SIEM is clearly an essential one – aggregate, correlate & analyze all of the security-relevant information in your environment so that you can: Identify exposures Investigate incidents Manage compliance Measure your information security program
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
Download the full report to explore: The History of "SEM, SIM, or SIEM?" What's Wrong with SIEM? What Options Organizations Have Besides SIEM? AlienVault's Unified Security Management platform AlienVault Labs Threat Intelligence and Open Threat Exchange
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Aug 12, 2016
The Magic Quadrant summarizes Gartner’s yearly analysis of the SIEM market and compares the positions of leading competitors like AlienVault. Get Gartner's complete analysis of each SIEM vendor, and learn what makes AlienVault a Visionary. View the latest report.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Aug 12, 2016
UW-Superior’s IT team was looking to replace their outdated intrusion prevention system. After a full evaluation of AlienVault’s Unified Security Management™ (USM) platform, they decided to leverage it to meet their IDS needs. As the team became familiar with using AlienVault USM as their intrusion detection system, they began to implement the other tools that make up the USM platform. They realized that because so many security features were already included in USM, like behavioral monitoring, SIEM and vulnerability assessment, they would not have to purchase additional security tools that they previously thought they would need.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault
Published By: A10 Networks     Published Date: Aug 21, 2009
This white paper highlights the complex nature of traditional authentication and identity management practices and shows how A10 Networks unified identity and access management solutions simplify the convergence of network, security, and identity resources for proper deployment.
Tags : 
identity management, authentication, access control, anti spam, anti spyware, anti virus, a10, a10 networks
    
A10 Networks
Published By: NetIQ Corporation     Published Date: Jan 29, 2007
This white paper identifies what is required for a comprehensive and integrated security management solution and examines the difference between SEM, SIM and SIEM and the challenges of enterprise level security monitoring.
Tags : 
security management, event management, network security, monitoring, network security, enterprise level security, enterprise security, netiq, net iq, security, it management, application security, internet security, policy based management, security policies, wireless security
    
NetIQ Corporation
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.