SIEM - News, Features, and Slideshows
I have told you about the need to tune our security incident and event monitoring (SIEM) tool. Now we need to tune the analysts who are monitoring the SIEM.
By By Mathias Thurman | 28 August, 2014 22:46
Marketers at Domino's Pizza are gaining new and more immediate insights into online coupon usage from an unexpected source: a security management tool used by the national chain's IT department.
By Ellen Messmer | 24 October, 2013 19:08
ForeScout Technologies Tuesday introduced technology that allows other security vendors as well as third parties such as systems integrators to share monitoring and security-related information directly with ForeScout's CounterAct network-access control product.
By Ellen Messmer | 15 October, 2013 21:56
McAfee has unveiled a security appliance it calls McAfee Advanced Threat Defense which uses sandboxing technology to open incoming files to safely "explode" them to see if they contain stealthy malware.
By Ellen Messmer | 02 October, 2013 18:04
HP today took the wraps off its Next-Generation Firewall line designed to exert application-level controls and visibility over all traffic related to the enterprise, including mobile devices used in public WiFi settings and traffic from cloud services.
By Ellen Messmer | 17 September, 2013 14:26
Whitepapers about SIEM
Everybody has logs and ultimately will have to deal with them. In this guide, Dr. Anton Chuvakin analyses the relationship between SIEM and log management for a new solution. · Security information and event management (SIEM) emerged in the 1990s, but it has always been controversial · This paper analyses the relationship between SIEM and log management, focusing on technical differences, uses and architecting joint deployments · Dr Chuvakin provides recommendations for companies that have deployed log management or SIEM so they can plot their roadmap for enhancing deployment
This helpful infographic on mobile enterprise management (MEM) details the driving forces behind this new trend, as well important considerations regarding impact on cost, productivity and security. • Increasingly, the devices used for businesses are no longer company-owned, meaning an increase in necessary IT support • Companies are most interested in device management to alleviate security and compliance concerns • BYOD models benefit companies and end users with cost savings, choice, and to demonstrate progressiveness from IT staff
- Here's what's in Asus' $2,699 Zenbook NX500 laptop
- Ex-NSA director Alexander calls for new cybersecurity model
- Eric Holder says 'worrisome' tech companies are eyeing encryption
- Microsoft unveils 'spiritual successor' to Windows 7 by going to 10
- What you need to know about social-network upstart Ello
- Mercedes-Benz shows off self-driving 18-wheeler
- IPsoft seeks to grow the 'brains' of virtual assistants
- Microsoft skips a number, says 'Windows 10' will be a big break from the past
- Q&A: Meet Microsoft's new Azure CTO, Mark Russinovich
- China's 3D printing market to quadruple
- Four charged with stealing Army helicopter training software
- Cray aims to stay in big leagues with XC40 supercomputers
- Icahn says PayPal spin-off is almost a 'no brainer'
- Mobile developers get offline sync in new Amazon SDK
- Oracle unveils Alta, a next-generation user interface