information management

Results 226 - 250 of 663Sort Results By: Published Date | Title | Company Name
By: TriGeo Network Security     Published Date: Oct 03, 2008
It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. What’s surprising to many is that this technology can play a significant role in actively defending networks. This whitepaper explains precisely how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide unprecedented network visibility, security and control.
Tags : trigeo whitepaper, siem, log management, security event management, automated remediation, active response, correlation, compliance, proactive network security, security
     TriGeo Network Security
By: VMware     Published Date: Feb 26, 2009
VMware Virtual Infrastructure and CA Recovery Management (CA ARCserve Backup and CA Xosoft products) team up to deliver higher availability and risk-resistance for business-critical information and applications, while lowering management and operational costs and complexity.
Tags : vmware, it infrastructure, virtual infrastructure, ca recovery management, business critical information, business continuity, disaster recovery, high availability, operational costs, virtual infrastructure, multi-processor support, virtual machines, disk-to-disk-to-tape, multiple operating systems, value-enhancing services, security
     VMware
By: PitneyBowes     Published Date: Sep 29, 2010
New study sheds light on how colleges and universities can better connect with alumni.
Tags : pitney bowes, information management, mail creation, mailing
     PitneyBowes
By: EMC Corporation     Published Date: Aug 05, 2014
To develop the visibility, agility and speed to deal with advanced threats, traditional security strategies for monitoring, often based around security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics. In particular, four fundamental capabilites are required: 1. Pervasive visibility 2. Deeper analytics 3. Massive scalability 4. Unified view Download here to learn more!
Tags : big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security
     EMC Corporation
By: Trend Micro Inc.     Published Date: Aug 25, 2011
Download the ESG white paper to help you identify: -Why virtualization should scare you -Security you didn't know existed -How to be confident in the cloud
Tags : trend micro, information security, virtualization, cloud, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service
     Trend Micro Inc.
By: McAfee     Published Date: Jan 23, 2013
Information security based on regulatory compliance stipulations cannot keep up with today’s sophisticated and rapidly changing threat landscape. CISOs need to implement a new discipline that ESG calls, “Real-time Risk Management."
Tags : enterprise strategy group, esg, jon oltsik, real-time risk management, threats and vulnerabilities, security
     McAfee
By: McAfee     Published Date: Feb 06, 2013
This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.
Tags : continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring, pci compliance
     McAfee
By: McAfee     Published Date: Feb 06, 2013
This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of today’s dynamic threat landscape.
Tags : big data, big security data, mcafee siem, intrusion detection systems, security monitoring
     McAfee
By: McAfee     Published Date: Feb 06, 2013
Integrating SIEM and threat intelligence to mitigate bad actors is essential for having a resilient security posture. The McAfee response is to expand the Security Connected framework by pairing McAfee SIEM and McAfee Global Threat Intelligence.
Tags : threat intelligence, bad actors, siem, mcafee global threat intelligence, mcafee gti, mcafee risk advisor, security connected
     McAfee
By: McAfee     Published Date: Feb 06, 2013
Read about the top five issues McAfee customers face with security information and event management (SIEM) and see corresponding use cases and customer case studies.
Tags : big security data, siem, mcafee global threat intelligence, mcafee gti, mcafee risk advisor, security connected
     McAfee
By: McAfee     Published Date: Feb 06, 2013
This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.
Tags : risk and compliance, patch management, siem, policy compliance and configuration, database security, mcafee vulnerability manager, mcafee risk advisor, mcafee policy auditor, mcafee enterprise security manager
     McAfee
By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance, security
     McAfee
By: McAfee     Published Date: Nov 20, 2014
This paper is the result of a recent SANS survey exploring the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.
Tags : siem, threat intelligence, platform integration, correlation and analysis, third-party intelligence tools, security
     McAfee
By: RightAnswers     Published Date: Sep 04, 2013
Every day, technology plays a bigger and bigger role throughout corporate America, corporate success becomes increasingly dependent on productive use of information technology – and IT support grows more critical. But while excellent IT support rapidly returns users to productive work, the information necessary to that excellence is often fragmented in different parts of the IT organization. Effective knowledge management empowers service desks – and even users themselves – by enabling quick, accurate and consistent user solutions. That leads to measureable benefits for your business. This brief explores 20 metrics that measure those benefits – in other words, your “return on knowledge.”
Tags : return on knowledge, knowledge management, rightanswers, knowledge, measuring business benefits, crm, customer relationship management, crm, b2b
     RightAnswers
By: Cisco     Published Date: Dec 21, 2016
The Federal Risk and Authorization Management Program (FedRAMP) provides a cost-effective, risk-based approach for the adoption and use of cloud services by U.S. government agencies. FedRAMP processes are designed to assist federal government agencies in meeting Federal Information Security Management Act (FISMA) requirements for cloud systems. By standardizing on security assessment, authorization, and continuous monitoring for cloud products and services, this program delivers costs savings, accelerated adoption, and increased confidence in security to U.S. government agencies that are adopting cloud technologies.
Tags : 
     Cisco
By: STARLIMS     Published Date: Apr 16, 2014
Learn how Laboratory Information Systems (LIS) are becoming outdated and see how they are being replaced by Information Management Systems that can provide flexible management capabilities that provide informatics solutions.
Tags : starlims, lims, laboratories, lis systems
     STARLIMS
By: STARLIMS     Published Date: Apr 16, 2014
Learn how a Laboratory Information Management System can improve trace evidence management in the crime lab, but will also help analysts with data entry, documentation, and quality control.
Tags : starlims, lims, trace evidence management, crime lab, quality control
     STARLIMS
By: STARLIMS     Published Date: Apr 16, 2014
Learn how a Laboratory Information Management System reduced turnaround time for all system functions by an average of 50% for a pharmaceutical manufacturer.
Tags : starlims, flexible electronic canvas, lims
     STARLIMS
By: Adobe     Published Date: Jun 26, 2019
In the race to please customers and beat out the competition, there’s been a lot of talk about customer data platforms (CDPs). For marketers, a CDP is just what they’ve been looking for — a more comprehensive approach to unified customer data that lets you include raw personally identifiable information or sensitive data in your data pool. But while IT teams see the ultimate value, they may question the idea introducing a new point solution that complicates their tech stack even more. The days of brute forcing customer experience with new technology are over. Today, IT teams need to make decisions about customer experience management that span the business and go beyond marketing. That requires a different approach to the customer data problem. To learn more about our solution to the customer data platform, read our article Real-time CPD. Real-time customer experience.
Tags : 
     Adobe
By: Oracle Primavera     Published Date: Apr 17, 2015
Learn how top performers select and execute transformative projects due to the centralized information and automated processes that Project Portfolio Management (PPM) solutions provide.
Tags : ppm, oracle, transformative projects, project portfolio management
     Oracle Primavera
By: CommVault     Published Date: Jun 10, 2015
Data and information management is becoming increasingly complex and dynamic. There are innovations in technology and process that can supply new advantages.
Tags : software, backup, optimize, management, efficiency
     CommVault
By: Cherwell Software     Published Date: Apr 24, 2019
Each year, a total of 180,000 IT service tickets are created and processed. These include requests and incidents of all kinds, such as the provision of the flight information displays, an employee request for a laptop, through to IT equipment for an airline customer. The Airport’s IT team therefore decided to undertake a complex and ambitious project, entitled “ITSM 2020,” which aimed to establish a uniform and future-oriented IT service management system that would effectively and efficiently serve all areas of Munich Airport. Munich Airport evaluated various bidders in a two stage process conducted on the basis of the European Union tendering procedures. Cherwell was able to hold its own against other ITSM solutions both technically and in terms of price.
Tags : 
     Cherwell Software
By: LogRhythm     Published Date: Aug 08, 2016
The need for early detection of targeted attacks and data breaches is driving the expansion of new and existing SIEM deployments. Advanced users are looking to augment SIEM with advanced profiling and analytics.
Tags : cyber threat, cyber risk, technology, best practices, business management, business analytics, security
     LogRhythm
By: LogRhythm     Published Date: Aug 08, 2016
Security information and event management technologies vary widely in their focus and functionalities, with vendors offering divergent security monitoring visions. This research helps IT security managers align their needs with one of the three most common use cases to choose the best SIEM solution.
Tags : security, technology, best practices, information technology
     LogRhythm
By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
     VMware
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com