IT Management  >   Systems Operations  >   Network Management  >   Network Monitoring  >  

Event Correlation

RSS Feed    Add to Google    Add to My Yahoo!
Event Correlation White Papers (View All Report Types)
 
Excluding Frequent from Analysis for Smarter Anomaly Detection
sponsored by Prelert
WHITE PAPER: This brief resource delves into the art and science of whitelisting frequent entities to detect abnormalities faster and with greater ease. Read on and learn how to craft a dynamic whitelist for your threat detection strategy to never miss an abnormality or hidden attack again.
Posted: 05 Feb 2016 | Published: 04 May 2015

Prelert

Tripwire IT Security & Compliance Automation Solutions –Empowering IT Security in an Insecure World
sponsored by Tripwire, Inc.
WHITE PAPER: In this solution brief, discover how Tripwire IT security and compliance automation solutions provides the visibility, intelligence and automation of IT security controls needed to gain confidence in the protection of your data.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Tripwire, Inc.

Trend Estimation for Time Series Anomaly Detection
sponsored by Prelert
WHITE PAPER: This in-depth white paper teaches you how to properly use trend estimation for anomaly detection to improve your network security. Continue reading to learn how to avoid the most common difficulties of accurate automatic anomaly detection.
Posted: 03 Feb 2016 | Published: 05 Jan 2016

Prelert

Partitioning vs. "Split By" Clause in Anomaly Detection
sponsored by Prelert
WHITE PAPER: This white paper points out the finer differences between anomaly detection approaches and how each affects your anomaly score. Read on to learn which strategy will enhance your network security.
Posted: 02 Feb 2016 | Published: 20 Jul 2015

Prelert

The Essentials Series: Security Information Management
sponsored by Dell SecureWorks
WHITE PAPER: This collection of articles from Realtime Publishers presents a clear and concise overview of security information management (SIM). The articles present the business case for SIM, operational and organizational issues, and hints and tips for ensuring a successful SIM implementation.
Posted: 02 Dec 2009 | Published: 09 Oct 2009

Dell SecureWorks

Anomaly Detection in Periodic Data
sponsored by Prelert
WHITE PAPER: This white paper examines how machine learning anomaly detection can cut through the vast amounts of periodicity to reveal the true abnormal and potentially malicious behavior within your network/systems. Read on and discover how to accurately locate deviations in expected network behavior.
Posted: 05 Feb 2016 | Published: 10 Apr 2015

Prelert

Top 5 Network Performance Management Mistakes & How to Avoid Them
sponsored by Netcordia
WHITE PAPER: This whitepaper will look at five of the most common mistakes when it comes to network performance management and discuss how IT organizations can get ahead of the curve by automating network management and giving the appropriate level of visibility to different levels of IT staff. Read on to learn how your organization can fix these mistakes.
Posted: 12 Aug 2009 | Published: 12 Aug 2009

Netcordia

Optimize Anomaly Detection: Insider Tips for Success
sponsored by Prelert
WHITE PAPER: This brief white paper teaches you how to properly backfill historical data to build baseline analyses for ongoing anomaly searches. View now for expert anomaly detection tips and tricks.
Posted: 04 Feb 2016 | Published: 06 Jul 2015

Prelert

The Ultimate Management Solution for Citrix Environments
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Managing service levels and proactively identifying issues before they impact performance are top systems management problems. Learn how to enable the effective management of Citrix server-based computing environments.
Posted: 01 May 2007 | Published: 01 Apr 2007

Hewlett Packard Enterprise

Keys to the Kingdom: Monitoring Privileged user actions for security and compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper examines some of the types of insider threats organizations face today and the role monitoring and managing privilege user actions plays in security and compliance reporting efforts.
Posted: 06 Mar 2012 | Published: 06 Mar 2012

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement