HIT Consultant Insightful coverage of healthcare innovation
 

siem

Results 101 - 125 of 222Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Jul 24, 2013
Big data holds many answers, but only if an organization has the capability to harness the ever growing amounts of security information. In deploying a SIEM solution to analyze this data, organizations can repel advanced threats in real-time as well as spot the stealthy, dormant threat.
Tags : 
siem, big security data, security information, advanced threats, security intelligence
    
McAfee
Published By: McAfee     Published Date: Jul 24, 2013
The most menacing type of cyberattack is invisible. The risk to enterprises is real as evidenced by recent high-profile attacks. Organizations need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.
Tags : 
stealthy attacks, malware, intrusion prevention system, siem, layered security controls
    
McAfee
Published By: McAfee     Published Date: Jul 24, 2013
SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Tags : 
siem, data storage, event analysis, attacks, forensic analysis
    
McAfee
Published By: McAfee     Published Date: Apr 16, 2014
Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem
    
McAfee
Published By: McAfee     Published Date: Apr 16, 2014
Big data holds many answers, but only if an organization has the capability to harness the ever growing amounts of security information. In deploying a SIEM solution to analyze this data, organizations can repel advanced threats in real-time as well as spot the stealthy, dormant threat.
Tags : 
siem, big security data, security information, advanced threats, security intelligence
    
McAfee
Published By: McAfee     Published Date: Apr 16, 2014
SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Tags : 
siem, data storage, event analysis, attacks, forensic analysis
    
McAfee
Published By: McAfee     Published Date: Apr 16, 2014
This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting.
Tags : 
sans, siem, information and event correlation, critical security controls, reporting
    
McAfee
Published By: McAfee     Published Date: Apr 16, 2014
SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.
Tags : 
siem, sans, endpoint, network, correlation, integration
    
McAfee
Published By: McAfee     Published Date: Apr 16, 2014
This paper examines what US federal agencies and organizations should look for in log management strategy and integration into and support of applicable and prospective security and compliance programs and initiatives.
Tags : 
siem, log management, federal agency, compliance, situational awareness, visualization
    
McAfee
Published By: McAfee     Published Date: Apr 16, 2014
Why, when and how to re-evaluate your SIEM. Two years after Securosis wrote their first paper on replacing your SIEM, they’re back to update you on SIEM’s continually evolving drivers for threat management, operational efficiency and compliance.
Tags : 
siem, vendor evaluation, threat management, compliance, tco, operational efficiency
    
McAfee
Published By: McAfee     Published Date: Oct 28, 2014
SANS recently surveyed incident response (IR) teams to get a clearer picture of what they're up against today. The results are in; most organizations lack formalized IR plans, they expressed a need to collect and correlate threat intelligence and SIEM tools are their focus for improving IR capabilities.
Tags : 
siem, incident response, ir capabilities, ir obstacles, threat intelligence, detection and remediation, data breach
    
McAfee
Published By: McAfee     Published Date: Oct 28, 2014
For SIEM to help usher in more effective security and risk management strategies—particularly related to threat mitigation, embracing trends, and aligning with business priorities—these five business issues must be addressed. McAfee spoke with SIEM users and this brief lists those top issues along with corresponding customer case studies and use cases.
Tags : 
big security data, situational awareness, real-time context, management ease, integrated security, siem, mcafee, risk management strategies
    
McAfee
Published By: McAfee     Published Date: Oct 28, 2014
Compliance and financial risk used to be the driving concerns for security and risk management. Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem
    
McAfee
Published By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance
    
McAfee
Published By: McAfee     Published Date: Nov 20, 2014
A survey commissioned by Intel Security and conducted by Evalueserve, in conjunction with the report, suggests that a majority of companies lack confidence in their ability to detect targeted attacks in a timely manner. Even companies best prepared to handle targeted attacks are taking the time to investigate high volumes of events. Key findings include 78% of those able to detect attacks in minutes had a proactive, real-time SIEM solution.
Tags : 
siem, incident response, ir capabilities, threat intelligence, indicators of attack, indicators of compromise, foundstone, ioas
    
McAfee
Published By: McAfee     Published Date: Nov 20, 2014
How do we get more visibility into attacks across our environments, improve our response, and reduce response time? SANS Analyst, James Tarala, provides insight on the solution by automating functions that should be automated and connecting the dots between detection systems and response. Connecting these dots and applying intelligence provides responders rich context into the observed behaviors for taking action. Integrating these processes improves accuracy, while reducing time, manpower, and costs involved in detecting and managing events. This white paper explores how to achieve this.
Tags : 
sans, incident response, detection systems, data correlation and aggregration, siem, security analytics tools
    
McAfee
Published By: McAfee     Published Date: Nov 20, 2014
This paper is the result of a recent SANS survey exploring the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.
Tags : 
siem, threat intelligence, platform integration, correlation and analysis, third-party intelligence tools
    
McAfee
Published By: Siemens     Published Date: Jun 06, 2014
Providers like Dignity Health, Inspira Health Network, and PinnacleHealth are leveraging their HIEs to help solve care-coordination problems, helping to reduce costs, streamline communication, and improve provider and patient satisfaction.
Tags : 
siemens, hie, clinical workflows, care coordination, reduce costs, streamline communication, healthcare
    
Siemens
Published By: Siemens     Published Date: Jun 06, 2014
Using MobileMD technology from Siemens and Intel® data center technologies, the Charlotte Hungerford Hospital (CHH) and its CHHconnect partners are demonstrating meaningful use, coordinating care, and improving efficiency across their extended community.
Tags : 
siemens, hie, clinical workflows, care coordination, reduce costs, streamline communication, healthcare, mobilemd
    
Siemens
Published By: Siemens     Published Date: Jun 06, 2014
This interview features answers to common questions about HIE technology by Tom Pacek, the health system’s Vice President and Chief Information Officer, and Ed Rodriguez, Director of Ambulatory Informatics.
Tags : 
siemens, hie, clinical workflows, care coordination, reduce costs, streamline communication, healthcare
    
Siemens
Published By: Siemens     Published Date: Jun 06, 2014
This white paper examines some of the critical success factors for a sustainable population health management program and how the CareXcell™ solution can provide the IT infrastructure needed to address new value-based care requirements.
Tags : 
siemens, hie, clinical workflows, care coordination, reduce costs, streamline communication, healthcare
    
Siemens
Published By: Siemens     Published Date: Jun 06, 2014
In implementing its patient portal, Main Line Health’s goal was to create a one-stop portal for the entire health system. With four acute-care hospitals, several outpatient facilities, a physical medicine and rehab hospital and a drug and alcohol treatment center, Main Line Health needed a solution that could quickly relay information from multiple points of care to thousands of patients.
Tags : 
siemens, hie, clinical workflows, care coordination, reduce costs, streamline communication, healthcare, patient portal
    
Siemens
Published By: AlienVault     Published Date: Oct 21, 2014
Two of the oldest and most common attacks used against web applications, SQL injection attacks and cross-site scripting attacks (XSS), continue to impact thousands of websites and millions of users each year. Finding these exposures quickly is essential in order to prevent system compromise and avoid information leakage. SIEM solutions can be invaluable in this effort by collecting and correlating the data you need to identify patterns that signal an attack.
Tags : 
alienvault, sql injection, web security, cyber attacks, siem solutions, xss, cross site scripting attacks, siem
    
AlienVault
Published By: LogRhythm     Published Date: Aug 08, 2016
The need for early detection of targeted attacks and data breaches is driving the expansion of new and existing SIEM deployments. Advanced users are looking to augment SIEM with advanced profiling and analytics.
Tags : 
cyber threat, cyber risk, technology, best practices, business management, business analytics
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 19, 2016
In this webinar Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Niemen Marcus, Sony and other breaches. By analyzing the available information about these recent data breaches, from the perspective of detection, the two have assembled an interesting list of security monitoring lessons and ideas. The list includes tips on how to eliminate double false positives, a number of generalized monitoring scenarios, as well as acknowledges the incredible power of monitoring for new executables running for the first time on your environment. If you are concerned about data breaches and you're involved in SIEM and other security monitoring, this is the webinar for you.
Tags : 
cyber threat, cyber risk, technology, best practices
    
LogRhythm
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.