SIEM - News, Features, and Slideshows
I have told you about the need to tune our security incident and event monitoring (SIEM) tool. Now we need to tune the analysts who are monitoring the SIEM.
By By Mathias Thurman | 28 August, 2014 22:46
Marketers at Domino's Pizza are gaining new and more immediate insights into online coupon usage from an unexpected source: a security management tool used by the national chain's IT department.
By Ellen Messmer | 24 October, 2013 19:08
ForeScout Technologies Tuesday introduced technology that allows other security vendors as well as third parties such as systems integrators to share monitoring and security-related information directly with ForeScout's CounterAct network-access control product.
By Ellen Messmer | 15 October, 2013 21:56
McAfee has unveiled a security appliance it calls McAfee Advanced Threat Defense which uses sandboxing technology to open incoming files to safely "explode" them to see if they contain stealthy malware.
By Ellen Messmer | 02 October, 2013 18:04
HP today took the wraps off its Next-Generation Firewall line designed to exert application-level controls and visibility over all traffic related to the enterprise, including mobile devices used in public WiFi settings and traffic from cloud services.
By Ellen Messmer | 17 September, 2013 14:26
Whitepapers about SIEM
Everybody has logs and ultimately will have to deal with them. In this guide, Dr. Anton Chuvakin analyses the relationship between SIEM and log management for a new solution. · Security information and event management (SIEM) emerged in the 1990s, but it has always been controversial · This paper analyses the relationship between SIEM and log management, focusing on technical differences, uses and architecting joint deployments · Dr Chuvakin provides recommendations for companies that have deployed log management or SIEM so they can plot their roadmap for enhancing deployment
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTAcquisition Marketing ExceutiveNSW
- FTStudio Design ManagerVIC
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- FTProgram Manager - Integration & SolutionsNSW
This whitepaper describes how to gain flexible, end-to-end management of the ever-changing mobile workforce landscape with suitable Enterprise Mobility Management (EMM). • Employing best practices can set you on the right course for addressing current needs and planning for the future • Change is the only constant in the mobile workforce landscape with multiple new models per year, frequent OS updates and new vendors emerging • Employees are resistant to corporate security policies and corporate control if it impedes their productivity or personal privacy
- China to open up Internet broadband market with upcoming trials
- Close shaves between aircraft and drones on the upswing
- Obama signs legislation allowing regulatory e-labels for smartphones, wearables
- Data retention inquiry to report in early 2015
- Aus government begins review of cyber security strategy
- Communications coalition urges national focus on broadband adoption
- Melbourne IT eyes social media market with Tiger Pistol
- Building a non-distributed big data computing solution on Amazon Web Services
- Pressure mounts in Europe for strict net neutrality
- Use Uber? Snapchat? Google Maps? Now Twitter knows
- Opera pitches all-you-can-eat app stores to mobile operators
- Apple-IBM products in November? Not quite
- Amazon's Fire sale: Phone is now just $199 unlocked
- PoS malware also targeting ticket vending machines and electronic kiosks
- Oracle, Oregon tussle over whether federal court should hear Cover Oregon case