Blog Posts Tagged with "SIEM"

7477d0986a135e5e948d70e9995a609c

Log Consolidation, SIEM or Both?

October 17, 2010 Added by:John Verry

In the old days there was a fundamental decision to make when implementing log management technology. It boiled down to whether or not you needed the increased capabilities of SIEM such as real-time correlation and advanced integration with other core systems...

Comments  (5)

C787d4daae33f0e155e00c614f07b0ee

Coping with the Inevitability of a Data Breach

October 13, 2010 Added by:Robb Reck

While an attacker will eventually figure out a way around your firewall, as soon as they do a good SIEM can alert the NOC and send technicians rushing to respond. In a perfect world, we will keep attackers, both external and internal, from having the opportunity to exploit our systems. But the reality is that breaches do occur...

Comments  (0)

1961d93172f8088a077c52e638e31f41

Real Time Social Media Monitoring and Correlation

September 29, 2010 Added by:Heather Howland

The Internet has revolutionized how individuals and corporations interface with the each other, and now social networks are revolutionizing how we interface with the Internet. Unfortunately, these innovations have come at a tremendous cost to enterprise security efforts...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

End of An Era: HP Acquires ArcSight

September 24, 2010 Added by:Anton Chuvakin

The last independent software SIEM worth buying was acquired. The biggest SIEM game winner ArcSight was acquired by HP for about $1.5b. As people are already calling me en masse to comment, here is a post with a random sampling of conclusions, predictions and lessons learned...

Comments  (0)

55e2c9d06a7261846e96b8bb2d4e1fe5

The Key to Selecting SIEM and Log Management

September 21, 2010 Added by:bitraptor bitraptor

Securing today's networks and meeting compliance requirements are dual challenges faced by every IT team. Bad things are happening much faster, as new exploits are discovered, weaponized, and distributed to the world within hours...

Comments  (3)

Ebb72d4bfba370aecb29bc7519c9dac2

New SIEM Whitepaper on Use Cases In-Depth

August 21, 2010 Added by:Anton Chuvakin

Comprehensive firewall log collection is mandatory for this use case, and it is important to remember that firewalls can record both failed and successful connections through the firewall – both types are essential for SIEM...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

How Do You Get The Best SIEM?

June 15, 2010 Added by:Anton Chuvakin

Some security technologies – like network firewalls - are getting pretty darn close to being commoditized and differences between products are ever-so-close to being wiped out. SIEM, let me tell you, is nowhere near this.

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »