security operations

Results 151 - 173 of 173Sort Results By: Published Date | Title | Company Name

5 Security Controls for an Effective Security Operations Center (SOC)

Published By: AlienVault     Published Date: Mar 30, 2016
Whether you’re part of a security team or a one-man show, this guide will teach you what data your SOC needs to operate effectively and what methods and tools you can use to gather that data.
Tags : 
    
AlienVault

How to Build a Security Operations Center (on a Budget)

Published By: AlienVault     Published Date: Oct 20, 2017
Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations. The chapters you'll read focus on: • The roles and responsibilities involved in a security operations team • The key processes you'll need to build a security operations center • The essential security monitoring tools needed for a fully functional security operations center • How threat intelligence is used in a security operations center • Real world examples of how organizations have used AlienVault USM to power their security operations center For many organizations (unless you work for a large bank), building a SOC may seem like an impossible task. With limited resources (time, staff, and budget), setting up an operations center supported b
Tags : 
    
AlienVault

The Role Of SAN Security In Storage Operations Management

Published By: Creekpath     Published Date: Aug 21, 2009
An effective storage management solution must consider the role of SAN security in ensuring network and data integrity. When Direct Attached Storage (DAS) was the majority of storage, security was not an issue. By preventing access to the server you could stop access to the server-owned storage resources of disk and tape. Holes in SAN security practices can threaten data integrity and system availability.
Tags : 
storage management, som, storage operations management, direct attached storage, das, san security, high availability, data integrity, database security, data protection, backup, creekpath, security management
    
Creekpath

Vulnerability Assessment for the Security Operations Center

Published By: netVigilance     Published Date: Aug 21, 2009
This white paper explains the evolving needs for vulnerability assessment, the special requirements inherent within large enterprises, and how SecureScout SP from netVigilance meets those needs.
Tags : 
vulnerability management, ips, intrusion prevention, security management, hackers, hacker, hacker detection, network security, net vigilance, netvigilance, security, application security, intrusion detection
    
netVigilance

Tips to Deploy Web Services Security

Published By: Reactivity     Published Date: Aug 21, 2009
This white paper discusses the three critical Web services deployment issues-security, provisioning connections, and operations. As each is owned by different factions within an enterprise, each can become a 'show stopper' to Web services deployment initially, and every time a change must be made.
Tags : 
web service security, secure web services, web service, internet security, web applications, file sharing, network security, reactivity, software development, application security, web development, web services, xml
    
Reactivity

Wireless Technology Migration: Mitigating Risk and Increasing Supply Chain Efficiency

Published By: PEAK Technologies, Inc.     Published Date: Jul 05, 2007
Today's competitive, agile business demands anytime/anywhere connectivity and access to real time data. Outdated technology, security concerns and compliance requirements are forcing companies throughout industries to consider migrating to advanced wireless systems for supply chain operations.
Tags : 
scm, supply chain management, mobile computing, mobile data systems, real-time data, wireless systems, supply chain productivity, supply chain compliance, supply chain technology, wireless technology, wireless technologies, peak, peak technologies, wireless
    
PEAK Technologies, Inc.

Right-Shoring: Claiming Competitive Advantage by Managing Complexity

Published By: optionsXpress     Published Date: Feb 09, 2009
The dynamics of today’s global supply chain are changing rapidly because of volatile fuel costs, increasing wages in overseas locations, post-9/11 security concerns, and global economic issues.In this environment, some U.S. manufacturers and parts suppliers are exploring ways to claim a competitive advantage by bringing operations back to, or near to, the United States.
Tags : 
exel, global supply chain, supply chain, right shoring, global sourcing, crossing borders, offshoring, global economy, enterprise applications, supply chain management, system management software
    
optionsXpress

LogRhythm Compliance Support for FISMA

Published By: LogRhythm     Published Date: Sep 26, 2008
Find out more about how LogRhythm can help organizations fulfill The Federal Information Security Management Act (FISMA) requirements in documentation and implementation of controls for IT systems that support operations and assets.
Tags : 
fisma, nist compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations, event management solution, enterprise applications, hipaa compliance
    
LogRhythm

Bolster Network Security with VPN Load Balancing and Redundancy

Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Today’s Wide Area Networks (WANs) are experiencing increased saturation with the deployment of bandwidth-intensive applications, increased numbers of users, and the need for reliable security transmissions. IT personnel responsible for these issues acknowledge the increased congestion and have strived to maintain high levels of network performance. At the same time, IT departments are tasked with the job of lowering the cost of network infrastructure and ongoing operations. Network administrators continually face the challenge of balancing the increased use of critical applications on the Internet, while eliminating downtime and congestion from affecting user quality and day-to-day business operations.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation

The Architecture and Security of SAS Marketing Operations Management

Published By: SAS     Published Date: Apr 16, 2015
This white paper describes the architecture of SAS Marketing Operations Management and various aspects of its deployment and security. The following areas are covered: • High-level architecture overview • Architectural components • Ecosystem • Virtualization • Deployment options • Deployment best practices • Security This paper is intended for those involved in purchasing, selling and implementing SAS Marketing Operations Management, including system administrators and anyone seeking an understanding of the solution’s architecture and security.
Tags : 
    
SAS

Deploy and Maintain Thousands of Security Devices in Seconds

Published By: McAfee     Published Date: Oct 28, 2013
View this demonstration to see how masses of security devices in complex and geographically diverse organizations can be operated from one single point of operations in a way that is cheaper, easier, faster, and safer.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, networking, security
    
McAfee

Packet-Based Security Forensics: A Next-Generation Approach to Attack Remediation

Published By: Viavi Solutions     Published Date: Apr 07, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
    
Viavi Solutions

IBM Security Services Cyber Security Intelligence Index

Published By: IBM     Published Date: Sep 06, 2013
In this IBM security report, we will take a look at the data we've gathered through our monitoring operations and the security intelligence generated by our analysts and incident response teams who interpret that data. Our aim is to help you gain important insights into the current threat landscape - with a close look at the volume of attacks, the industries most impacted , the most prevalent types of attacks and attackers, and the key factors enabling them.
Tags : 
ibm, security services, cyber security intelligence, index, security report, security attacks, security protection, business security, data security, security intelligence index, security, enterprise applications, data management, business technology
    
IBM

End-to-End Security Visibility into Your Environments with Splunk and AWS

Published By: AWS     Published Date: Oct 07, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS

How Pokémon Secures Data for Hundreds of Millions of Users with Sumo Logic

Published By: AWS     Published Date: Oct 07, 2019
Pokémon experienced massive growth in the number of downloads for their most popular gaming app. Ensuring customer data was managed, secured, and private was a top priority for their Information Security team. Join us to learn how Pokémon leveraged Sumo Logic on AWS to implement a security analytics solution to scale with their rapid growth. Pokémon will also discuss how they strengthened their overall security posture, gained a unified view of operations, and delivered on their core values of trust and child safety.
Tags : 
    
AWS

Creating the Network for the Future Digital Financial Institution

Published By: Juniper Networks     Published Date: Jun 22, 2017
The digital financial services world has created an amplified set of challenges for the data center and network. Its role in enabling the success of the wider institution has become even more critical, but to deliver this it needs to provide a higher level of performance with increased agility, while maintaining high levels of efficiency and security. This is forcing institutions to transform their underlying IT capabilities, with the need to simplify the network, obtain more flexible connectivity, automate IT operations, and enable centralized control and administration being core strategies in this respect. As shown in Figure 8, this is driving a number of requirements for the future network. Key considerations for financial institutions in architecture design and vendor selection should be around moving toward a software-defined, intelligent, cloud-ready, and open network that enables the institution to meet its ICT imperatives and achieve these key ICT strategies.
Tags : 
account security, data management, network protection, secure systems, application security, network performance, network diagnostics
    
Juniper Networks

Integrated Security Analytics – Revolutionizing DLP Incident Response

Published By: Forcepoint     Published Date: Oct 02, 2019
Security systems generate a large number of alerts, but only a small subset of them represent critical risks to high value business data. Noise – whether it comes from personal communication, broken business processes or false positives – makes the task of identifying genuine data theft risks challenging, even for wellresourced security operations teams.
Tags : 
    
Forcepoint

3 Reasons: Why DevOps is a Game-Changer for Security

Published By: Tenable     Published Date: Mar 07, 2018
"Learn how you can accelerate development and strengthen security – without disrupting your operations. Organizations that effectively meld DevOps and InfoSec can shift security from an afterthought to an integrated, automated, and proactive practice. By reading this paper from IDG, you’ll learn three reasons why DevOps is a game-changer for security and steps you can take foster a more collaborative and proactive approach to securing your enterprise. Topics covered include: - Adapting security testing tools and processes to the developer - Automating security into the CI/CD toolchain - The impact of secure DevOps on your bottom line - Increasing security awareness and commitment across teams This paper provides high-level guidance for DevOps and InfoSec professionals seeking collaborative, efficient approaches for strengthening application and information security."
Tags : 
secure devops, container security, docker, infosec
    
Tenable

Safeguard Business and IoT Integrity with Secure App Service

Published By: DigiCert     Published Date: Jun 19, 2018
The Internet of Things (IoT) has rapidly transformed the digital landscape and the world we live in. Intelligent devices and sensors connect smart cars, robotic manufacturing equipment, smart medical equipment, smart cities, industrial control systems, and much more in a way that improves lives and saves businesses billions of dollars. But along with its benefits, rapid IoT growth introduces a new dimension of security vulnerabilities that dramatically escalates the nature and seriousness of cybercrime risks. In addition to traditional confidentiality cyber risks, IoT threats include attacks that can: • Render smart appliances useless • Shut down city power grids • Threaten lives through hacked pacemakers and other medical devices. Such security flaws not only endanger lives, frustrate customers, and disrupt business operations, but they create significant cost and public relations damage for IoT developers and manufacturers.
Tags : 
    
DigiCert

Why customers are switching to OL

Published By: Oracle Linux     Published Date: Oct 24, 2018
Learn how customers are improving security, reducing downtime, simplifying operations, and saving money by switching to Oracle Linux support.
Tags : 
    
Oracle Linux

The Future of Security Operations

Published By: Group M_IBM Q4'19     Published Date: Sep 17, 2019
With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. The Securosis report on “The Future of Security Operations” explains how security orchestration and automation can help security teams address the skills shortage, alert overload, and increasingly sophisticated cyberattacks.
Tags : 
    
Group M_IBM Q4'19

CEMOSoft Delivers Data-Driven Retail from the IoT Edge to the Cloud

Published By: Intel     Published Date: Apr 09, 2019
Retailers, along with many other vertical industries, seek to take advantage of the benefits of the Internet of Things (IoT) to improve customer experience management. However, quickly analyzing relevant data to inform decision-making and respond e?ectively to rapidly changing customer behaviors is challenging. The CEMOSoft* platform is designed to create opportunities, while addressing shifting demographics and an evolving IoT landscape. It o?ers a mobile customer engagement experience that can be dynamically modified on the ?y, along with the increased security and intelligence of an Intel® architecture based IoT gateway and Windows® 10 IoT Core. The result is an a?ordable, ?exible, scalable platform that brings ongoing customer insight to many aspects of daily operations
Tags : 
    
Intel
Start   Previous    1 2 3 4 5 6 7     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.