IT Management  >   Systems Operations  >   Network Management  >   Network Monitoring  >  

Event Correlation

RSS Feed    Add to Google    Add to My Yahoo!
Event CorrelationReports
 
Effective Ways to Search Log Files
sponsored by SearchSecurity.com
EGUIDE: Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

SearchSecurity.com

E-Guide: Selecting a SIM for midmarket business
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses the evolvement of SIM tools, differences in deployment processes and top requirements you should consider before making a decision.
Posted: 01 Nov 2011 | Published: 31 Oct 2011

SearchSecurity.com

The Essentials Series: Security Information Management
sponsored by Dell SecureWorks
WHITE PAPER: This collection of articles from Realtime Publishers presents a clear and concise overview of security information management (SIM). The articles present the business case for SIM, operational and organizational issues, and hints and tips for ensuring a successful SIM implementation.
Posted: 02 Dec 2009 | Published: 09 Oct 2009

Dell SecureWorks

The Importance of Network Time Synchronization
sponsored by Symmetricom
WHITE PAPER: This paper explains why accurate network time -- and therefore precise network time synchronization -- is critically important for network management. Read on to learn more about the importance of network time synchronization.
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Symmetricom

The Ultimate Management Solution for Citrix Environments
sponsored by Hewlett-Packard Company
WHITE PAPER: Managing service levels and proactively identifying issues before they impact performance are top systems management problems. Learn how to enable the effective management of Citrix server-based computing environments.
Posted: 01 May 2007 | Published: 01 Apr 2007

Hewlett-Packard Company

Keys to the Kingdom: Monitoring Privileged user actions for security and compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper examines some of the types of insider threats organizations face today and the role monitoring and managing privilege user actions plays in security and compliance reporting efforts.
Posted: 06 Mar 2012 | Published: 06 Mar 2012

LogRhythm, Inc.

Computer Weekly – 19 March 2013: Delivering software development success
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.
Posted: 18 Mar 2013 | Published: 19 Mar 2013

ComputerWeekly.com

The Need for Effective Event Management
sponsored by GFI Software
PRODUCT LITERATURE: This paper examines various corporate needs and provides information on how GFI EventsManager can help corporations achieve important goals.
Posted: 22 Jun 2007 | Published: 01 Jun 2007

GFI Software

GFI PCI Suite
sponsored by GFI Software
TRIAL SOFTWARE: The GFI PCI Suite is a package comprising the core software required for PCI DSS compliance.
Posted: 22 Jun 2007 | Premiered: 01 Jun 2007

GFI Software

Funnel vs. Framework: Rapid Value from SIEM through a Program- Driven Approach
sponsored by Vigilant
WHITE PAPER: Why are some organizations successful with SIEM and others faulter? The shortcomings of SIEM projects are usually not the fault of technology, but in the processes that were deployed. This paper explores the pitfalls of implementing SIEM through a technology-centric “funnel” approach and the value SIEM can bring though a program-driven approach.
Posted: 01 Apr 2012 | Published: 30 Mar 2012

Vigilant
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement