IT Management  >   Systems Operations  >   Network Management  >   Network Monitoring  >  

Event Correlation

RSS Feed    Add to Google    Add to My Yahoo!
Event Correlation White Papers (View All Report Types)
 
Partitioning vs. "Split By" Clause in Anomaly Detection
sponsored by Prelert
WHITE PAPER: This white paper points out the finer differences between anomaly detection approaches and how each affects your anomaly score. Read on to learn which strategy will enhance your network security.
Posted: 02 Feb 2016 | Published: 20 Jul 2015

Prelert

Excluding Frequent from Analysis for Smarter Anomaly Detection
sponsored by Prelert
WHITE PAPER: This brief resource delves into the art and science of whitelisting frequent entities to detect abnormalities faster and with greater ease. Read on and learn how to craft a dynamic whitelist for your threat detection strategy to never miss an abnormality or hidden attack again.
Posted: 05 Feb 2016 | Published: 04 May 2015

Prelert

Anomaly Detection in Periodic Data
sponsored by Prelert
WHITE PAPER: This white paper examines how machine learning anomaly detection can cut through the vast amounts of periodicity to reveal the true abnormal and potentially malicious behavior within your network/systems. Read on and discover how to accurately locate deviations in expected network behavior.
Posted: 05 Feb 2016 | Published: 10 Apr 2015

Prelert

Tripwire IT Security & Compliance Automation Solutions –Empowering IT Security in an Insecure World
sponsored by Tripwire, Inc.
WHITE PAPER: In this solution brief, discover how Tripwire IT security and compliance automation solutions provides the visibility, intelligence and automation of IT security controls needed to gain confidence in the protection of your data.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Tripwire, Inc.

Continuous Monitoring: Responding to New Threats in More Complex IT Environments
sponsored by Tripwire, Inc.
WHITE PAPER: Governments today are focusing on the practice of continuous monitoring as a means to providing the much needed balance between data access and protection. In this paper, learn more about continuous monitoring, including what is it and why it’s needed, guidelines for implementing it, key capabilities of an effective solution, and more.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Tripwire, Inc.

Best Practices for Building a Security Operations Center
sponsored by CA Technologies.
WHITE PAPER: In this paper, we explore the business and technical requirements that organizations must consider when implementing a SOC.
Posted: 27 Dec 2006 | Published: 01 Aug 2006

CA Technologies.

Protecting Information from Insider Threats
sponsored by McAfee.
WHITE PAPER: Company insiders have what outsiders don’t – trust and legitimate access. Any malicious insider has the ability to steal sensitive data and sabotage assets quickly, easily, and with greater stealth than an external attacker. In this paper, explore best practices and the security controls necessary to combat insider threat.
Posted: 30 Jan 2012 | Published: 30 Jan 2012

McAfee.

The Importance of Network Time Synchronization
sponsored by Symmetricom
WHITE PAPER: This paper explains why accurate network time -- and therefore precise network time synchronization -- is critically important for network management. Read on to learn more about the importance of network time synchronization.
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Symmetricom

Top 10 - A Guide to Selecting a SIM Solution for Regulatory Compliance
sponsored by ArcSight, an HP Company
WHITE PAPER: This guide has been compiled directly from the experiences of actual customers. These practices should be used as an integral part of your evaluation and selection process
Posted: 25 Jan 2007 | Published: 01 Jan 2007

ArcSight, an HP Company

Keys to the Kingdom: Monitoring Privileged user actions for security and compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper examines some of the types of insider threats organizations face today and the role monitoring and managing privilege user actions plays in security and compliance reporting efforts.
Posted: 06 Mar 2012 | Published: 06 Mar 2012

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement