SIEM - News, Features, and Slideshows
I have told you about the need to tune our security incident and event monitoring (SIEM) tool. Now we need to tune the analysts who are monitoring the SIEM.
By By Mathias Thurman | 28 August, 2014 22:46
Marketers at Domino's Pizza are gaining new and more immediate insights into online coupon usage from an unexpected source: a security management tool used by the national chain's IT department.
By Ellen Messmer | 24 October, 2013 19:08
ForeScout Technologies Tuesday introduced technology that allows other security vendors as well as third parties such as systems integrators to share monitoring and security-related information directly with ForeScout's CounterAct network-access control product.
By Ellen Messmer | 15 October, 2013 21:56
McAfee has unveiled a security appliance it calls McAfee Advanced Threat Defense which uses sandboxing technology to open incoming files to safely "explode" them to see if they contain stealthy malware.
By Ellen Messmer | 02 October, 2013 18:04
HP today took the wraps off its Next-Generation Firewall line designed to exert application-level controls and visibility over all traffic related to the enterprise, including mobile devices used in public WiFi settings and traffic from cloud services.
By Ellen Messmer | 17 September, 2013 14:26
Whitepapers about SIEM
Everybody has logs and ultimately will have to deal with them. In this guide, Dr. Anton Chuvakin analyses the relationship between SIEM and log management for a new solution. · Security information and event management (SIEM) emerged in the 1990s, but it has always been controversial · This paper analyses the relationship between SIEM and log management, focusing on technical differences, uses and architecting joint deployments · Dr Chuvakin provides recommendations for companies that have deployed log management or SIEM so they can plot their roadmap for enhancing deployment
BIG-IQ Security makes it easy to manage the entire firewall policy life cycle. Read about the key benefits and download the policy auditing and security compliance report today
A growing number of organisations are using off the shelf technologies to stretch application processing and data access for continuous application and availability. This paper describes how deployment models for applications work. Enterprises are consolidating high availability and data recovery practices and technologies to achieve continuous availability that provides users with uninterrupted access to data and applications The right solution provides data coherency across distance for simultaneous access to the same data in multiple locations Organisations need to be able to trust that the data and applications it depends on will continues to be available and operate, through both planned and unplanned outages
- After harrowing 10-month trek, NASA's Maven orbits Mars
- SpaceX Dragon cargo craft heads to space station
- Brocade unveils OpenDaylight SDN controller
- Delve, Office Graph must transcend Office 365 to be revolutionary
- The 2014 Enterprise Architecture Awards
- iPhone 6 sales top 10M on opening weekend, 11% more than in '13
- EMC reportedly held merger talks with Hewlett-Packard
- How haptics will transform your gadgets
- Microsoft pushes back Xbox One release date in China
- Microsoft knocks iOS 8 install requirements, ups OneDrive free space
- Microsoft, Getty copyright dispute heads for mediation
- Government to address startup issues after long wait
- Harper review recommends scrutiny of trade agreement IP clauses
- In Pictures: Meet the 12 wealthiest people in social media
- In Pictures: Eight is enough?