event management

Results 151 - 175 of 261Sort Results By: Published Date | Title | Company Name
Published By: McAfee EMEA     Published Date: Nov 15, 2017
In response to an increasingly complex IT ecosystem and expanding attack surface, Intel Security offers a unified threat defense lifecycle. Intel Security delivers an integrated, connected architecture that dramatically increases speed and capacity of organizations to prevent and respond to attacks. Our architecture reduces complexity and improves operational efficiency, providing critical integrated, adaptive, and orchestrated intelligence and response capabilities. This empowers customers to block threats more effectively, identify compromises, and implement quick remediation and stronger countermeasures.
Tags : 
security information, event management, orchestration, surface, intel security
    
McAfee EMEA
Published By: Mimecast     Published Date: Oct 25, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : 
mimecast, data loss, data leaks prevention, dlp, risk, compliance, information security, email management
    
Mimecast
Published By: Mimecast     Published Date: Oct 17, 2013
This white paper discusses the important issues related to email and Office 365 continuity and offers recommendations for decision makers to consider as they develop their continuity plans. The paper also provides a brief overview of Mimecast, the sponsor of this paper, as well as their relevant solutions.
Tags : 
mimecast, unified email management, osterman research, business continuity, office 265 environments, email reliability, email downtime prevention, growth of office 365
    
Mimecast
Published By: nCircle     Published Date: Aug 16, 2011
Get Compliance & Security Metrics for Benchmarking and Trending
Tags : 
vulnerability management, ip360, security risk management, vulnerability assessment, discriminant analysis, network security management, network vulnerability, vulnerabilities and exposures
    
nCircle
Published By: NetIQ     Published Date: Jun 11, 2012
Learn about SIEM and Log Management use cases, differences, best practices and common mistakes. Receive Your Complimentary White Paper NOW!
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
    
NetIQ
Published By: NetIQ     Published Date: Jun 11, 2012
Take the effort out of log management and gain the actionable information you need to improve your organization's security posture. Receive your complimentary whitepaper NOW!
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
    
NetIQ
Published By: NetIQ     Published Date: Jun 11, 2012
This white paper examines some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program that can solve today's needs and support new requirements in the future.
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
    
NetIQ
Published By: NetIQ     Published Date: Jun 12, 2012
This report outlines the future look of Forrester's solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise.
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
    
NetIQ
Published By: NetIQ     Published Date: Nov 01, 2012
In this paper, we will analyze the relationship between SIEM and log management, focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.
Tags : 
security information, event management, log management, pci dss, security, business technology
    
NetIQ
Published By: NetIQ     Published Date: Nov 05, 2012
The broad adoption of SIEM technology is driven by security and compliance needs. Targeted attack discovery requires effective user activity, data access and application activity monitoring. Vendors are testing demand for broader-scope solutions.
Tags : 
siem technology, threat management, security management, enterprise security, compliance, security, business technology, research
    
NetIQ
Published By: NETIQ     Published Date: Mar 12, 2013
In this paper, we will analyze the relationship between SIEM and log management, focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.
Tags : 
security information, event management, log management, pci dss, security, business technology
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
Forrester’s solution for security and risk executives working on building an identity and access management strategy for the extended enterprise that includes BYOD and cloud apps. It will help you understand and navigate the business and IT trends aff
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
    
NETIQ
Published By: NetIQ Corporation     Published Date: Jan 29, 2007
This white paper identifies what is required for a comprehensive and integrated security management solution and examines the difference between SEM, SIM and SIEM and the challenges of enterprise level security monitoring.
Tags : 
security management, event management, network security, monitoring, network security, enterprise level security, enterprise security, netiq
    
NetIQ Corporation
Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Discover how NetIQ Security Manager can help your organization comply with the log collection and analysis requirements within recent regulations and standards.
Tags : 
security management, monitoring, compliance, log management, logging, event management, hipaa, hipaa compliance
    
NetIQ Corporation
Published By: netVigilance     Published Date: Aug 21, 2009
Managing network vulnerabilities will be the biggest challenge for C-Level executives in the coming years. Intrusions are more frequent and more malicious, so the security of corporate networks, and therefore the security of the entire corporation are dependent on the ability to quickly identify, prioritize and remediate vulnerabilities in the network.
Tags : 
cost control, it spending, network security, budget, ids, intrusion prevention, vulnerability management, net vigilance
    
netVigilance
Published By: netVigilance     Published Date: Aug 21, 2009
This white paper explains the evolving needs for vulnerability assessment, the special requirements inherent within large enterprises, and how SecureScout SP from netVigilance meets those needs.
Tags : 
vulnerability management, ips, intrusion prevention, security management, hackers, hacker, hacker detection, network security
    
netVigilance
Published By: NitroSecurity     Published Date: Aug 21, 2009
NitroSecurity's Security Event Aggregation and Correlation Engine (N-SEAC) is a patented, key differentiator of the NitroSecurity IPS solution. It allows enterprise customers the ability to collect and analyze threat information more efficiently and in an accurate and timely manner.
Tags : 
intrusion prevention, ips, n-seac, intrusion detection, ids, security management, nitrosecurity, nitro security
    
NitroSecurity
Published By: Nixu     Published Date: Nov 06, 2006
This white paper is an overview of the Nixu Security System and the various security principles it encompasses.  Topics discussed include security design, application security, OS hardening, patch management, and more.
Tags : 
network security, patch management, firewall, intrusion prevention, application security, security management, nixu, security
    
Nixu
Published By: Oracle     Published Date: Oct 20, 2017
What do these market-defining trends have in common? · Analytics for all · Analytics as competitive differentiator · Internet of Things · Artificial intelligence/Machine learning/Cognitive computing · Real-time analytics/event management They all rely on data – timely, accurate data delivered within an insightful context – to deliver value. The question is: who in the enterprise is most qualified and prepared to help deliver on the vision and values of the data-driven enterprise? It’s going to take a special type of professional to deliver that value to enterprises. Organizations are seeking professionals to step forward and take the lead, provide guidance and lend expertise to move into the brave new world of digital. The move to digital and all that it entails – sophisticated data analytics, online customer engagement and digital process efficiency – requires, above all, the skills and knowledge associated with handling data and turning it into insights. The move to digital i
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
What do these market-defining trends have in common? · Analytics for all · Analytics as competitive differentiator · Internet of Things · Artificial intelligence/Machine learning/Cognitive computing · Real-time analytics/event management They all rely on data – timely, accurate data delivered within an insightful context – to deliver value. The question is: who in the enterprise is most qualified and prepared to help deliver on the vision and values of the data-driven enterprise? It’s going to take a special type of professional to deliver that value to enterprises. Organizations are seeking professionals to step forward and take the lead, provide guidance and lend expertise to move into the brave new world of digital. The move to digital and all that it entails – sophisticated data analytics, online customer engagement and digital process efficiency – requires, above all, the skills and knowledge associated with handling data and turning it into insights. The move to digital is also a
Tags : 
    
Oracle
Published By: Oracle     Published Date: Sep 30, 2019
Email deliverability and privacy matters now more than ever. New and existing laws up the stakes for companies that don’t comply with standards and regulations. And today’s email marketers find it increasingly difficult to be heard. You need to master deliverability and privacy to tackle the noise generated by social media, other email marketers, and even word-of-mouth marketing. Your reputation as an email sender impacts your potential reach as a marketer. Here are some factors that can earn you a poor deliverability score and prevent emails from reaching your desired target: f Lack of adherence to an email privacy policy f Poor list management f Frequency and relevancy of sends f Complaints from recipients f Number of blocks f Spam trap hits f How people are engaging Getting your message delivered is vital to revenue performance. A slight increase at the top of the funnel can make a huge difference to your bottom line.
Tags : 
    
Oracle
Published By: Oracle Corp.     Published Date: Sep 19, 2012
An Oracle White Paper - August 2012
Tags : 
oracle, enterprise, process management, complex event processing, management, processing
    
Oracle Corp.
Published By: Oracle Primavera     Published Date: Oct 09, 2015
This solution brief explores how companies can transform the efficiency of their STO and solve business challenges in six key areas with Oracle’s Primavera Shutdown, Turnaround and Outage Solution. Understanding STO events are a core part of business. Oracle’s Primavera Shutdown, Turnaround and Outage Solution has been developed to support the transformation of your customers/prospects STO business by providing a predictable solution that supports scope, cost, schedule, risk and change throughout the STO event lifecycle.
Tags : 
oracle, sto, sto business, sto event cycle, shutdown turnaround outage, sto solution, project management, portfolio management
    
Oracle Primavera
Published By: Origami Risk     Published Date: Dec 23, 2019
Medical error is the third-leading cause of death in the United States.Many healthcare providers continue to use lagging systems that don’t efficiently collect or analyze data. Furthermore, a mix of legacy and new systems makes for potential conflicts that add to the confusion and fortify workplace silos. Without the sharing of information, organizations fail to see big-picture strategies and solutions that could help prevent medical errors and increase patient safety. Integrated healthcare risk management software that can work seamlessly and securely with existing software is one of the missing links to knocking down silos and developing strategies that contribute to a reduction in deaths due to human error. Here are some of the specific ways healthcare risk management software accomplishes this.
Tags : 
    
Origami Risk
Published By: Origami Risk     Published Date: Feb 06, 2020
Risk management in healthcare requires the highest level of data accuracy and protection in order to best serve patients and healthcare organizations. In this guide, you will learn the most effective trends, including: How a healthcare ERM program unifies quality care efforts How hospitals can increase patient safety event reporting The benefits of integrating healthcare claims management
Tags : 
    
Origami Risk
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.