IT Management  >   Systems Operations  >   Network Management  >   Network Monitoring  >  

Event Correlation

RSS Feed    Add to Google    Add to My Yahoo!
Event Correlation White Papers (View All Report Types)
 
Anomaly Detection in Periodic Data
sponsored by Prelert
WHITE PAPER: This white paper examines how machine learning anomaly detection can cut through the vast amounts of periodicity to reveal the true abnormal and potentially malicious behavior within your network/systems. Read on and discover how to accurately locate deviations in expected network behavior.
Posted: 05 Feb 2016 | Published: 10 Apr 2015

Prelert

Keys to the Kingdom: Monitoring Privileged user actions for security and compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper examines some of the types of insider threats organizations face today and the role monitoring and managing privilege user actions plays in security and compliance reporting efforts.
Posted: 06 Mar 2012 | Published: 06 Mar 2012

LogRhythm, Inc.

The Essentials Series: Security Information Management
sponsored by Dell SecureWorks
WHITE PAPER: This collection of articles from Realtime Publishers presents a clear and concise overview of security information management (SIM). The articles present the business case for SIM, operational and organizational issues, and hints and tips for ensuring a successful SIM implementation.
Posted: 02 Dec 2009 | Published: 09 Oct 2009

Dell SecureWorks

The Ultimate Management Solution for Citrix Environments
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Managing service levels and proactively identifying issues before they impact performance are top systems management problems. Learn how to enable the effective management of Citrix server-based computing environments.
Posted: 01 May 2007 | Published: 01 Apr 2007

Hewlett Packard Enterprise

Partitioning vs. "Split By" Clause in Anomaly Detection
sponsored by Prelert
WHITE PAPER: This white paper points out the finer differences between anomaly detection approaches and how each affects your anomaly score. Read on to learn which strategy will enhance your network security.
Posted: 02 Feb 2016 | Published: 20 Jul 2015

Prelert

Best Practices for Building a Security Operations Center
sponsored by CA Technologies.
WHITE PAPER: In this paper, we explore the business and technical requirements that organizations must consider when implementing a SOC.
Posted: 27 Dec 2006 | Published: 01 Aug 2006

CA Technologies.

Optimize Anomaly Detection: Insider Tips for Success
sponsored by Prelert
WHITE PAPER: This brief white paper teaches you how to properly backfill historical data to build baseline analyses for ongoing anomaly searches. View now for expert anomaly detection tips and tricks.
Posted: 04 Feb 2016 | Published: 06 Jul 2015

Prelert

Ponemon Study Finds IT Security Not Prepared for Advanced Attacks
sponsored by Prelert
WHITE PAPER: This white paper examines how security vulnerabilities compile when you ignore your organization's threat intelligence strategy. View now to learn the top network threats and how to detect them faster by enhancing threat intelligence.
Posted: 04 Feb 2016 | Published: 28 Oct 2015

Prelert

Excluding Frequent from Analysis for Smarter Anomaly Detection
sponsored by Prelert
WHITE PAPER: This brief resource delves into the art and science of whitelisting frequent entities to detect abnormalities faster and with greater ease. Read on and learn how to craft a dynamic whitelist for your threat detection strategy to never miss an abnormality or hidden attack again.
Posted: 05 Feb 2016 | Published: 04 May 2015

Prelert

Trend Estimation for Time Series Anomaly Detection
sponsored by Prelert
WHITE PAPER: This in-depth white paper teaches you how to properly use trend estimation for anomaly detection to improve your network security. Continue reading to learn how to avoid the most common difficulties of accurate automatic anomaly detection.
Posted: 03 Feb 2016 | Published: 05 Jan 2016

Prelert
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement