it event management

Results 1 - 25 of 182Sort Results By: Published Date | Title | Company Name

Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work

Published By: Accelops     Published Date: Nov 05, 2012
Read this white paper to learn about guidance to operationalize security and put the top 10 best SIEM practices to work, offering pertinent insights and details about how to gain more assure value from security information and event management.
Tags : 
siem, information security, security information, event management, security, business technology
    
Accelops

Cyber Security Checklist Part 2

Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic

Six Steps to SIEM Success

Published By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault

Practitioner’s Guide to a Security Operations Center (SOC)

Published By: AlienVault     Published Date: Aug 11, 2015
Read this paper to accelerate your evaluation of SOC tools and technology needs.
Tags : 
security operations center, soc, threat detection, soc tools, siem event correlation, security management, behavior monitoring, threat assessment
    
AlienVault

2015 Gartner Magic Quadrant for SIEM

Published By: AlienVault     Published Date: Aug 11, 2015
This report talks about Gartner's Magic Quadrant for SIEM in 2015
Tags : 
security information, event management, magic quadrant, gartner report, siem technology, event data, correlations, user activity monitoring
    
AlienVault

University of Wisconsin-Superior Secures Their Campus Network with AlienVault® USM™

Published By: AlienVault     Published Date: Aug 12, 2016
UW-Superior’s IT team was looking to replace their outdated intrusion prevention system. After a full evaluation of AlienVault’s Unified Security Management™ (USM) platform, they decided to leverage it to meet their IDS needs. As the team became familiar with using AlienVault USM as their intrusion detection system, they began to implement the other tools that make up the USM platform. They realized that because so many security features were already included in USM, like behavioral monitoring, SIEM and vulnerability assessment, they would not have to purchase additional security tools that they previously thought they would need.
Tags : 
    
AlienVault

University of Wisconsin-Superior Secures Their Campus Network with AlienVault® USM™

Published By: AlienVault     Published Date: Oct 05, 2016
UW-Superior’s IT team was looking to replace their outdated intrusion prevention system. After a full evaluation of AlienVault’s Unified Security Management™ (USM) platform, they decided to leverage it to meet their IDS needs. As the team became familiar with using AlienVault USM as their intrusion detection system, they began to implement the other tools that make up the USM platform. They realized that because so many security features were already included in USM, like behavioral monitoring, SIEM and vulnerability assessment, they would not have to purchase additional security tools that they previously thought they would need.
Tags : 
    
AlienVault

SIEM Analyst Research Bundle

Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
    
AlienVault

451 Research Report: AlienVault USM Anywhere

Published By: AlienVault     Published Date: Oct 20, 2017
In this report, you'll read 451 Research's review of AlienVault USM Anywhere. USM Anywhere is AlienVault's offering of centralized security information and event management for resource-constrained organizations embracing Amazon and Microsoft cloud architectures. The report covers the following areas: • 451's overview of AlienVault USM Anywhere • A brief look at the history of AlienVault • How USM Anywhere compares to competitors • A SWOT analysis of USM Anywhere Download the report now to learn more about AlienVault's unique approach to threat detection in cloud and hybrid cloud environments
Tags : 
    
AlienVault

Frost & Sullivan: What you SIEM is what you get

Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault

4 Revenue Metrics Driving Event Management Software Growth

Published By: Aventri     Published Date: Aug 14, 2018
"Revenue focused executives have four metrics that determine their success or failure: number of opportunities, size of opportunities, win rate, and speed to revenue. All teams work together to make sure that they achieve these goals and that they have the processes in place to optimize around them. Event management software is one piece of the puzzle that is designed to generate revenue. Read this eBook to see how event management software helps to speed up the buying process and win more deals!"
Tags : 
    
Aventri

4 Revenue Metrics Driving Event Management Software Growth

Published By: Aventri     Published Date: Apr 29, 2019
"Revenue focused executives have four metrics that determine their success or failure: number of opportunities, size of opportunities, win rate, and speed to revenue. All teams work together to make sure that they achieve these goals and that they have the processes in place to optimize around them. Event management software is one piece of the puzzle that is designed to generate revenue. Read this eBook to see how event management software helps to speed up the buying process and win more deals!"
Tags : 
    
Aventri

Securing Hard to Patch Servers in Health Care Environments

Published By: Blue Lane     Published Date: Apr 03, 2007
Find out how Blue Lane's unique approach can help health care IT pros quickly secure hard to patch servers.
Tags : 
ips, intrusion, patching, vulnerability, regulations, fda, security, hipaa
    
Blue Lane

Executive View: CA Privileged Access Manager

Published By: CA Technologies     Published Date: Apr 06, 2017
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure
    
CA Technologies

Disaster Recovery Planning for Today's Real World Outages

Published By: Commvault ABM Oct     Published Date: Jul 17, 2019
Automating disaster recovery and disaster recovery testing saves time and budget, plus reduces risk when there is an actual emergency. With weather events, ransomware, and other outages distruping your business, you need a modern disaster recovery solution that really works at time of disaster. Choosing the right disaster recovery solution can be the difference between keeping your business up and running or going dark during an emergency. Learn hoe the commvault platform for data management provides availability for your business against today's real world outages
Tags : 
    
Commvault ABM Oct

Development-Driven Performance Management

Published By: Cornerstone OnDemand     Published Date: Sep 08, 2010
Each year, organizations around the world go through the ritual of performance appraisal. Many see it as the company's main event, in terms of performance management - the time at which most, if not all, feedback and guidance to employees is given. Progress is evaluated. Rewards are distributed. Goals are set. Then that is it, until next year. Managers often open the process with a mixture of resignation, dread and the question, Why are we doing this again?
Tags : 
cornerstone, talent management, business continuity, business performance, globalization, performance management
    
Cornerstone OnDemand

Why Your Nonexistent Talent Management Strategy is Costing You Money

Published By: Cornerstone OnDemand     Published Date: Jul 16, 2015
Did you know that without a talent management strategy, a company with 2,000 employees is losing almost $2 million every year in preventable turnover alone? The new eBook, Why Your Nonexistent Talent Management Strategy is Costing You Money – And How to Fix It, shares the alarming hidden costs of managing employees “the way you've always done it.” If your organisation is still relying on manual processes to save money, this eBook will show you what you may be leaving on the table and steps you can take today to turn that around. You'll learn how a better talent management strategy can help your company achieve: • a 15% increase in earnings • more than 2x the median revenue per employee • 41% lower turnover rate among high performers
Tags : 
management strategy, talent management, performance, turnover, benefit
    
Cornerstone OnDemand

Why Your Nonexistent Talent Management Strategy is Costing You Money

Published By: Cornerstone OnDemand     Published Date: Oct 21, 2015
Did you know that without a talent management strategy, a company with 2,000 employees is losing almost $2 million every year in preventable turnover alone? The new eBook, Why Your Nonexistent Talent Management Strategy is Costing You Money – And How to Fix It, shares the alarming hidden costs of managing employees “the way you've always done it.” If your organisation is still relying on manual processes to save money, this eBook will show you what you may be leaving on the table and steps you can take today to turn that around. You'll learn how a better talent management strategy can help your company achieve: • a 15% increase in earnings • more than 2x the median revenue per employee • 41% lower turnover rate among high performers
Tags : 
reachmail, talent management, talent management strategy, employee management, effective employee management
    
Cornerstone OnDemand

PCI 3.0 Compliance Guide

Published By: CradlePoint     Published Date: Sep 04, 2014
In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint solutions. Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI DSS 3.0. Enabling features include network segmentation (ethernet ports, SSIDs, and VLANs), stateful firewall, MAC/IP/URL filtering, authentication/encryption, event logging, event alerts, time synchronization, and configuration/upgrade management from CradlePoint Enterprise Cloud Manager.
Tags : 
cradlepoint enterprise cloud manager, pci dss 3.0, pci compliance, stateful firewall, mac/ip/url filtering, authentication/encryption, event logging, event alerts
    
CradlePoint

A Practical Guide to Transform Manufacturing Operations with Smart Pull

Published By: Dassault Systèmes     Published Date: Jun 19, 2018
This white paper outlines a framework that emphasizes digitization and business transformation and the new opportunities pull processes bring. The mechanism of “Pull” processes—those triggered by an actual event instead of a forecast—is nothing new. It is at the heart of many successful manufacturing strategies. Recent technological advances in digitization, including the harnessing of Big Data analytics, the use of the cloud, Business Process Management (BPM), social media, IIoT, and mobility, have extended the power of Pull beyond Lean manufacturing. In the wake of the current technological innovation wave, it is not uncommon for manufacturers to not know what next step to take. In light of these new developments, this white paper will focus on the mechanism of business transformation enabled by these technologies, which can be attributed to two major forces: the power of Pull and digitization. Nine practical applications are detailed, showing how innovative manufacturers can better
Tags : 
    
Dassault Systèmes

Quest Workspace Help Desk

Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Help Desk is a robust help desk solution for small to medium-sized businesses with complex network environments. It provides a powerful combination of management features integrated with a best-of-breed IT help desk platform. Use the help desk software to manage the ticket system workflows, dashboards, reporting and end-user self-service portals. Use the embedded management features within the help desk platform to proactively manage network events, desktops, servers and applications as well as resolve issues faster and more effectively.
Tags : 
help desk, active directory, resolve issues, reports, windows, iphone, priorituze requests, auto escalation
    
Dell Software

The High Cost of Poor Website Security

Published By: DigiCert     Published Date: Jun 19, 2018
Your organization’s websites are some of its most valuable assets. But they are vulnerable to security issues and criminal attacks. Fortunately, many of these problems are preventable with effective, integrated website security management. For ecommerce sites, you can calculate the cost of downtime in terms of lost revenue. You can add to this the considerable cost of remediation, and beyond this, the damage to customer confidence and trust that may be intangible but will be significant. Even when there are no security issues, inefficient processes result in deployment of additional resource that drives up cost. This article explains why in comparison to the above costs, investing in security management, particularly across SSL/TLS Certificate management, can be a highly efficient and cost effective measure to take.
Tags : 
    
DigiCert

The Key to Smarter Enterprise Security

Published By: DigiCert     Published Date: Jun 19, 2018
Code signing is at a crossroads. In many enterprises, the traditional approach remains standard procedure: you purchase a code-signing certificate, download it, and deploy it locally for all your code-signing needs. When carefully managed, this approach can still be very effective in guarding against malware. But recent events have shown that many companies are finding it a challenge to manage their code signing certificate deployments—and failures in certificate management can have serious consequences. To discover how our Secure App Service solution can help you manage your codesigning efforts and provide enterprise-level support, all at a predictable cost, download this whitepaper today and find out more.
Tags : 
    
DigiCert

Deploying Strong Authentication with Fast and Efficient ROI

Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.
Tags : 
digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention
    
DigitalPersona UK

Cloud-based Security Management: Lowering Costs and Complexity with Software-as-a-Service

Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : 
end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security
    
DigitalPersona UK
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.