Security Event Systems OperationalWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Event Systems Operational returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Monitoring
 •   Business Intelligence Solutions
 •   Business Process Management (BPM)
 •   Event Automation
 •   Network Security
 •   Security Policies
 •   Operational BI
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   Industry Security
 •   Internet Based Security Event Systems
 •   Internet-Based Security Event
 •   Linux Based Security Event Systems
 •   Procedure Security Event Systems
 •   Procedures Security Event
 •   Security Audit
 •   Security Event Administration
 •   Security Event Cycles
 •   Security Event Systems Documents
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

RSA Security Information and Event Management (SIEM) Deployment Guide by RSA, The Security Division of EMC

December 10, 2010 - (Free Research)
The Cisco Smart Business Architecture for Enterprise offers partners and customers valuable network design and deployment best practices; helping organizations deliver superior end-user experiences that include switching, routing, security, and wireless technologies combined with the comprehensive management capabilities for the entire system. 
(WHITE PAPER) READ ABSTRACT |

The Cloud Risk Framework by ComputerWeekly.com

June 01, 2012 - (Free Research)
This unique cloud framework is designed to help organisations assess the financial risks of moving to the cloud. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The Business Case for a Next-Generation SIEM: Delivering Operational Efficiency and Lower Costs Through An Integrated Approach to Network Security Management by Q1 Labs, an IBM Company

October 07, 2010 - (Free Research)
The selection of the most effective IT technology is a major concern for companies of all sizes, across almost every industry. Read this white paper to learn more about how Q1 Labs' next-generation security information and event management solutions can help protect your IT assets at a lower cost to the company. 
(WHITE PAPER) READ ABSTRACT |

Sentinel Log Manager Review by Novell, Inc.

July 28, 2010 - (Free Research)
This paper is a review of the stand-alone Sentinel Log Manager and how it stands up to keyconcerns that survey respondents raised about log managers, including collection, storage andsearching/reporting capabilities. 
(WHITE PAPER) READ ABSTRACT |

Transforming Insight Into Action With Business Event Processing by IBM

December 31, 2009 - (Free Research)
This white paper explores key business event processing capabilities that are helping energy and utilities organizations to manage instrumented and intelligent utility networks detect outages, improve grid security, and prevent fraudulent use of energy. 
(WHITE PAPER) READ ABSTRACT |

Business Agility Insights Vol. 1, No. 1 by IBM

December 13, 2012 - (Free Research)
To achieve the business agility that today's fast-paced environments require, four invaluable technologies have come to the fore: business process management (BPM), case management, decision management, and event processing. Check out this expert e-zine to learn more about each of them, and examine three key avenues to smarter, faster operations. 
(EZINE) READ ABSTRACT |

Register Free to Visit Infosecurity Europe - 19th - 21st April 2011 by Infosecurity Europe

February 08, 2011 - (Free Research)
Europe's No. 1 Information Security event, with an unrivalled free education programme, exhibitors showcasing new and emerging technologies and offering practical and professional expertise. 
(EVENT) READ ABSTRACT |

Simplifying Log Collection, Storage and Analysis by ArcSight, an HP Company

September 29, 2009 - (Free Research)
ArcSight Logger is a turnkey appliance for collection, efficient storage, and high-performance search and reporting of all enterprise log data. Read this paper to learn more details. 
(PRODUCT OVERVIEW) READ ABSTRACT |

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams by Qualys, Inc.

March 06, 2009 - (Free Research)
This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance. 
(WHITE PAPER) READ ABSTRACT |

Business Agility Insights Issue 1 by eBizQ (E-mail this company)

April 16, 2012 - (Free Research)
Read this expert ebizQ.com e-zine to learn how business process management (BPM), complex event processing (CEP), case management, and decision management systems can help you boost your operational efficiency and intelligence. 
(EZINE) READ ABSTRACT |

Why Compliance Pays: Reputations and Revenues at Risk Research Report by Symantec Corporation

March 2009 - (Free Research)
Based on what is working among organizations with the fewest data losses, this IT Policy Compliance Group report identifies several practices that can assist businesses with improving IT compliance results and reduce business downtime. 
(WHITE PAPER) READ ABSTRACT |

Remote Data Protection by IBM

June 2008 - (Free Research)
Thanks to IBM's Remote Data Protection Service you can efficiently back up your data so that it can be more easily recovered in the event of a disaster. This pay-as-you-use subscription service includes hardware, software and operational support. 
(WHITE PAPER)

Event Data Warehousing by Hexis Cyber Solutions Inc

February 2008 - (Free Research)
This white paper describes that data warehousing should not necessarily be the basis upon which companies retain and query historic data for prolonged periods. 
(WHITE PAPER) READ ABSTRACT |

Expanding Active Decision-Making: The Power Of Integrating Business Rules And Events by Red Hat

December 2012 - (Free Research)
This resource describes how business rules management systems (BRMS) can help you incorporate real-time awareness into your applications and implement high levels of automation, while also simplifying application development, shortening development cycles, and more. 
(WHITE PAPER) READ ABSTRACT |

The new need for BI speed: Strategies, technologies and best practices for delivering real-time BI analytics by Tableau Software

September 2011 - (Free Research)
In this eBook, you'll get an overview of real-time BI plus insight and advice on planning and executing a real-time BI strategy. 
(EBOOK)

Unlock security success: Is security intelligence the key? by IBM

December 2012 - (Free Research)
This report from Forrester Research takes an inside look at the security intelligence (SI) market, explaining why SI needs to be an IT priority. Also inside, learn about the ongoing challenges that CISOs face, discover the growing interest in security-as-a-service, and more. 
(ANALYST REPORT) READ ABSTRACT |

Facilitating “sound practices” in risk management with IBM OpenPages ORM by IBM

February 2012 - (Free Research)
This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee. 
(WHITE PAPER) READ ABSTRACT |

The (Business) Day After: Making a Double Rebound from Disaster by Iron Mountain

February 2012 - (Free Research)
This white paper has today's best practices and keys to help you get back on your feet even if your backup data has been lost. Receive a backup maintenance checklist with key questions to ask regarding your backup strategies, discover common backup challenges and more. Read on to ensure you're prepared for the worst. 
(WHITE PAPER) READ ABSTRACT |

Combat Cybercrime, Demonstrate Compliance and Streamline IT Operations by ArcSight, an HP Company

March 2010 - (Free Research)
This whitepaper discusses the requirements for a universal log management solution and specifically describes how ArcSight Logger 4 delivers on those requirements. A recent cyberespionage incident at Boeing Corporation is highlighted as an example. Read more to find out. 
(WHITE PAPER) READ ABSTRACT |

Reducing Costs and Creating a More Secure IT Environment with a Holistic Approach to Data Protection: An ROI Analysis of FalconStor Storage Management Solutions by FalconStor Software

October 2010 - (Free Research)
Data protection and disaster recovery continue to be overarching challenges for most firms. To remedy a myriad of problems with data protection as well as operational and disaster recovery, companies are replacing legacy backup methods with new approaches. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Real-Time Risk Monitoring: Timely Monitoring and Management of Positions/Exposures by Sybase, an SAP company

June 2011 - (Free Research)
Check out this white paper now, compliments of Sybase, and learn how you can get timely monitoring and management of your positions and exposures—with less risk! 
(WHITE PAPER) READ ABSTRACT |

Oracle PeopleSoft CRM Integration into the Contact Center by AMC Technology

May 2008 - (Free Research)
This technical integration brief explains how the PeopleSoft CRM application can be integrated into a contact center, including both general technical details of call center integration, as well as how to use vendor certified software from AMC. 
(WHITE PAPER) READ ABSTRACT |

Beyond Job Scheduling by UC4 Software, Inc

October 2011 - (Free Research)
Organizations need a highly scalable and reliable automation platform to provide the end-to-end monitoring, orchestration, and execution to connect back and front office processes. Read this white paper to learn about an automation platform that provides these services in on-premise as well as virtual and cloud environments. 
(WHITE PAPER) READ ABSTRACT |

How to Improve Customer Experience with Real-time Operational Intelligence by Vitria Technology, Inc.

September 2013 - (Free Research)
View this resource to learn more about obtaining a real-time view of customer experience. With operational intelligence (OI), a real time data analytics solution, gives executives visibility into business processes enabling more insightful decisions. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts