security analytics

Results 51 - 75 of 195Sort Results By: Published Date | Title | Company Name
Published By: EMC Corporation     Published Date: Oct 01, 2014
Learn how by watching the RSA Security Analytics and RSA ECAT virtual on-demand event.
Tags : 
security, analytics, incidents, ecat, logs
    
EMC Corporation
Published By: EMC Corporation     Published Date: Oct 01, 2014
RSA Security Analytics 10.4 and RSA ECAT 4.0 will be revealed when you watch this on-demand event.
Tags : 
security, analytics, incidents, ecat, logs
    
EMC Corporation
Published By: RSA Security     Published Date: Oct 24, 2013
Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
Tags : 
rsa, emc, enterprise strategy, big data, security, security analytics
    
RSA Security
Published By: RSA Security     Published Date: Oct 24, 2013
Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Tags : 
rsa, emc, big data, security, security analytics, scale, security management
    
RSA Security
Published By: RSA Security     Published Date: Oct 24, 2013
To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Tags : 
rsa, emc, secuirty, warning, threat, analytics, security
    
RSA Security
Published By: RSA Security     Published Date: Oct 24, 2013
The status quo approach of collecting more logs from more sources won't help in detecting and responding to advanced threats. Logs are inherently limited in the level security visibility that they provide. Consider a new way of looking at SIEM.
Tags : 
rsa, emc, security, analytics, siem, security visibility
    
RSA Security
Published By: RSA Security     Published Date: Oct 24, 2013
New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle a much greater volume and wider scope of data than at present.
Tags : 
rsa, emc, security, analytics, architecture, data
    
RSA Security
Published By: RSA Security     Published Date: Oct 24, 2013
Mid-size enterprises face the challenges of managing advanced threats plus staff and budget constraints. This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics and how you can start small.
Tags : 
rsa, emc, threat, analytics, intelligence, threat detection, security
    
RSA Security
Published By: RSA Security     Published Date: Jan 07, 2014
Watch this on-demand webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis. Understand why organizations are moving to a true big data security platform where compliance is a byproduct of security, not the other way around.
Tags : 
security analytics, siem, advanced threats, best practices, security visibility, log collection, security
    
RSA Security
Published By: RSA Security     Published Date: Jan 07, 2014
The status quo approach of collecting more logs from more sources won't help in detecting and responding to advanced threats. Logs are inherently limited in the level security visibility that they provide. Consider a new way of looking at SIEM.
Tags : 
security analytics, siem, advanced threats, best practices, security visibility, log collection
    
RSA Security
Published By: K2     Published Date: Aug 24, 2015
This complementary template focuses on the eight key areas for business process automation success to help you evaluate the quality of the platforms you are considering and to ensure that the system you choose is agile and flexible enough to meet your business needs. WORKFLOW TOOLS AND FEATURES FORMS INTEGRATION AND DATA SECURITY MOBILE USER AND RUN-TIME EXPERIENCE REPORTING, ANALYTICS AND MONITORING MAINTENANCE/SUPPORT/HELP DOCUMENTATION
Tags : 
    
K2
Published By: ArborNetworks     Published Date: Feb 12, 2016
Security Analytics is one of the two fastest growing product categories in security.
Tags : 
arbor networks, insegment, security analytics, data protection, cyber defense, cyber security, security, data management
    
ArborNetworks
Published By: CloudHealth by VMware     Published Date: Feb 13, 2019
Google Cloud Platform is being widely adopted for its security and performance networking capabilities, machine learning, Kubernetes support, and data analytics. Google has been developing innovative price models to attract new users and provide cost benefits for customers. Read this eBook for answers to questions such as: -What are Committed Use Discounts? -Why do you need Committed Use Discounts? -What are Sustained Use Discounts? -What is the difference between Committed and Sustained Use Discounts? Download GCP Discounts and Why You Should Care to learn how you can take advantage of discounts in Google Cloud Platform to save you money on your monthly cloud bill.
Tags : 
cloud management, google cloud platform, multicloud management
    
CloudHealth by VMware
Published By: IBM     Published Date: Jan 11, 2017
Download this white paper to learn: - How the use of advanced analytics generates powerful insights to stay ahead of evolving cyber threats. - Why security infrastructure protection alone is not enough to thwart cyber criminals, and how you can fortify your existing security strategy. - How the use of both machine led analytics with human led analysis can help you mitigate threats.
Tags : 
ibm, analytics, public sector, security, cyber threat, cyber threat analysis, risk, enterprise applications, business technology
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Dec 21, 2017
Consider the volume of business content that your organization generates or receives every day: applications, forms, reports, office documents, audio, video, and even social media about your company. If it is poorly managed, not digitized, or disconnected from critical business processes, it creates chaos. This chaos impacts your ability to deliver exceptional customer service; it slows down important processes, increases security risk, and negatively impacts revenue. Conversely, controlling content chaos can significantly improve your analytics strategy by gaining insight and business value from dark or unstructured data sources. In this eBook, learn how cognitive and cloud-based Enterprise Content Management, or ECM, can help you protect your content while gaining a competitive advantage from it as you grow.
Tags : 
business content, volume, cloud-based, enterprise content management, ecm
    
Group M_IBM Q1'18
Published By: IBM     Published Date: May 30, 2018
Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM with advanced profiling, analytics and response features.
Tags : 
    
IBM
Published By: IBM     Published Date: May 30, 2018
If you are relying on a basic log manager or spreadsheets to manage security alerts, you may be missing critical threats in your network. You could boost your team's productivity with a modern SIEM platform. In this E-Book, you will learn the five most critical questions that you need to ask in order to determine the best security analytics solution for your organization.
Tags : 
    
IBM
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
In our 30-criteria evaluation of security analytics platforms providers, we identified the 13 most significant ones AlienVault, Exabeam, Fortinet, Gurucul, Huntsman Security, IBM, LogRhythm, McAfee, Micro Focus, Rapid7, RSA, Securonix, and Splunk and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : 
    
Group M_IBM Q119
Published By: Forrester Research     Published Date: Apr 27, 2015
Report | Recommendations for Enterprise Security in 2015
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks
    
Forrester Research
Published By: Forrester Research     Published Date: Apr 27, 2015
Download the report to learn how to prepare an Incident Response Plan that ensures your business recovers quickly and effectively.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks
    
Forrester Research
Published By: FICO     Published Date: Mar 14, 2017
In this Executive Brief, we share best practices in how to evaluate and deploy layered controls that will help you develop a holistic approach to controls, investigate and control where risk is introduced, assess your risk appetite and benchmark your cybersecurity posture against others in your industry.
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Published By: FICO     Published Date: Mar 14, 2017
Learn how technologies such as AI, self-calibrating models and self-learning analytics are being used to detect cyber attacks before they happen. Download now!
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Published By: FICO     Published Date: Mar 14, 2017
Are you ready for a new year of killer devices, hacked fingerprints, crooked migration and more? Download now.
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Published By: Avi Networks     Published Date: May 14, 2018
Avi Vantage is the only solution that delivers built-in application analytics in addition to enterprise-grade load balancing and application security. With millions of data points collected in real time, the platform delivers network-DVR like capabilities with the ability to record and display application analytics over specific time intervals (last 15 minutes, hour, day, week etc.) or for individual transactions. These application insights including total round trip time for each transaction, application health scores, errors, end user statistics, and security insights (DDoS attacks, SSL vulnerabilities, ciphers etc.) simplify troubleshooting of applications.
Tags : 
    
Avi Networks
Published By: Oracle     Published Date: Feb 21, 2018
As Mobile is the new normal for users to connect and consume content, you need to consider apps, mobile integration,security, analytics, development tools, life-cycle management, various mobile stakeholders, and the overall enterprise mobile ecosystem.
Tags : 
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee