Security event manager

Results: 175



#Item
1Emergency management / Incident management / Government / Mass fatality incident / Incident Command System / Incident commander / Emergency communication system / State of emergency / United States Department of Homeland Security

Mass Fatality Activation Plan Summary In the event of an incident occurring in New Mexico involving mass fatalities, the county or city Emergency Manager involved would take one of two steps: • •

Add to Reading List

Source URL: omi.unm.edu

Language: English - Date: 2013-12-18 16:42:46
2Network management / Computer security / System administration / Internet protocols / Internet standards / OSSEC / Security information and event management / Security event manager / Log analysis / System software / Computing / Information technology management

Silensec documents RED CHUNGU 13_07_16_v4(web)

Add to Reading List

Source URL: www.silensec.com

Language: English - Date: 2014-04-29 06:19:36
3Cyberwarfare / Advanced persistent threat / Security event manager / Hunting / Computer security / Security / Computer network security

DATASHEET SQRRL ENTERPRISE USE CASE: CYBER HUNTING Proactively uncover hidden threats through cyber hunting The days when Security Operations Center analysts could sit back and wait for alerts to come to them have long

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2015-05-22 14:48:50
4System administration / Internet protocols / Internet standards / System software / Syslog / Security event manager / Computer data logging / Syslog-ng / Microsoft SQL Server / Network management / Computing / Information technology management

Guy Bruneau, GSE About Me Senior Security Consultant @ipss inc.  Incident Handler @Internet Storm Center 

Add to Reading List

Source URL: handlers.sans.org

Language: English - Date: 2014-09-07 10:31:32
5Computer security / Cyberwarfare / Analysis / Netflow / Packet capture / Data security / Network intelligence / Security event manager / Security information and event management / Computer network security / Computing / Deep packet inspection

Use Case Study Security Information and Event Management (SIEM) Use Case With 5 Billion IoT devices by the end of this decade*, next generation SIEMs need to tackle latest security breaches and issues with advanced anal

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-05-28 10:26:33
6National security / Data security / Computer crimes / Public safety / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Security information and event management / Security event manager / Information security / Security / Computer security / Crime prevention

ESG Solution Showcase An Analytics-based Approach to Cybersecurity Date: May 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Since the Google Aurora incident announced in 2010, large organizations have faced

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2015-06-05 21:30:42
7Information technology management / Data security / Security information and event management / Secure communication / Network management / Security event manager / Syslog / Integrated Digital Enhanced Network / Computer security / Security / Computing

DATASHEET iCONNECT IBM i Event Monitoring with SIEM Integration

Add to Reading List

Source URL: static.helpsystems.com

Language: English - Date: 2014-02-04 11:45:36
8Computer security / Windows NT / Windows Server / Log analysis / Event Viewer / Microsoft Servers / Event data / Windows / System Center Operations Manager / Software / System software / Computing

DATASHEET Event Log Management for Security and Compliance Keeping track of user and administrator activity is at the heart of keeping your environment secure and complying with various IT regulations. Historically, mon

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2012-09-29 00:22:32
9Network architecture / Name server / OpenDNS / Security event manager / DNS spoofing / Dynamic DNS / Domain name system / Internet / Computing

Solution Brief: Covering Your DNS Blind Spot Enhance Your Security Visibility Improve Incident Response and Policy Compliance You may be thinking: “OK, so what, why should I care about having

Add to Reading List

Source URL: info.opendns.com

Language: English - Date: 2015-05-23 10:48:36
10Security / Security information and event management / Network security / Security event manager / Neural network / Sensage / LogLogic / Check Point / Anomaly detection / Data security / Computer security / Computing

Enhanced Security and Compliance through Neural Data Analysis A white paper by Privacyware Published by:

Add to Reading List

Source URL: www.privacyware.com

Language: English - Date: 2010-06-01 05:18:16
UPDATE