SIEM - News, Features, and Slideshows
I have told you about the need to tune our security incident and event monitoring (SIEM) tool. Now we need to tune the analysts who are monitoring the SIEM.
By By Mathias Thurman | 28 August, 2014 22:46
Marketers at Domino's Pizza are gaining new and more immediate insights into online coupon usage from an unexpected source: a security management tool used by the national chain's IT department.
By Ellen Messmer | 24 October, 2013 19:08
ForeScout Technologies Tuesday introduced technology that allows other security vendors as well as third parties such as systems integrators to share monitoring and security-related information directly with ForeScout's CounterAct network-access control product.
By Ellen Messmer | 15 October, 2013 21:56
McAfee has unveiled a security appliance it calls McAfee Advanced Threat Defense which uses sandboxing technology to open incoming files to safely "explode" them to see if they contain stealthy malware.
By Ellen Messmer | 02 October, 2013 18:04
HP today took the wraps off its Next-Generation Firewall line designed to exert application-level controls and visibility over all traffic related to the enterprise, including mobile devices used in public WiFi settings and traffic from cloud services.
By Ellen Messmer | 17 September, 2013 14:26
Whitepapers about SIEM
Everybody has logs and ultimately will have to deal with them. In this guide, Dr. Anton Chuvakin analyses the relationship between SIEM and log management for a new solution. · Security information and event management (SIEM) emerged in the 1990s, but it has always been controversial · This paper analyses the relationship between SIEM and log management, focusing on technical differences, uses and architecting joint deployments · Dr Chuvakin provides recommendations for companies that have deployed log management or SIEM so they can plot their roadmap for enhancing deployment
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- FTSenior SEO ManagerNSW
- FTStudio Design ManagerVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTProgram Manager - Integration & SolutionsNSW
- FTAcquisition Marketing ExceutiveNSW
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- FTStudio Design ManagerVIC
- FTChief Information Officer - CSIROACT
Security is an intrusive mechanism that is often seen to interfere with normal business operations. Nonetheless, security is essential to the normal operation of the business, and the right security mechanisms and approaches can minimize performance degradation.
- Grocers, retailers gobble up Apple Pay in time for holidays
- EU net neutrality legislation under threat from Italian proposals, says rights group
- Molecular flash memory could store massive data
- Google, Rockstar reach deal to settle lawsuit over Nortel patents
- NSA chief says cyberattacks on industrial systems are his top concern
- Intel plans 3D NAND flash next year for 'as much storage as you want'
- Telstra deploys 4G to 50 neglected rural sites
- More mobile broadband spectrum possible for emergency services
- Governments act against webcam-snooping websites
- Google: Would you pay to not see ads on favorite websites?
- Facebook's alternative PHP engine attracts Web service providers
- Intel planning thumb-sized PCs for next year
- Microsoft drops Dropbox into Office Mobile for Android
- Cameras, robotic mules could help battle Ebola in West Africa
- Uber, facing public backlash, will rethink privacy