HIT Consultant Insightful coverage of healthcare innovation
 

it event management

Results 1 - 25 of 182Sort Results By: Published Date | Title | Company Name
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: IBM     Published Date: Jul 31, 2015
Market trends and vendor evaluation criteria.
Tags : 
security, data, event management
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM as a leader in providing Security Information and Event Management (SIEM) software in the newly published Gartner Magic Quadrant for SIEM Technology. Read the Gartner report to learn why IBM is positioned as a leader, the strenghts of IBM QRadar for security intelligence & analytics and market trends and vendor evaluation criteria.
Tags : 
ibm, security, security intelligence, gartner, magic quadrant, siem
    
IBM
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Sep 17, 2019
US based automobile had multiple ServiceNow instances across multiple companies along with non-standardization of tools and processes. LTI helped in implementing end to end ServiceNow modules including ITSM, ITOM: Orchestration + Event Management thereby achieving high scalability in integrated processes across globe.
Tags : 
application management, artificial intelligence, b2b technology, cloud applications, cloud architect
    
Larsen & Toubro Infotech(LTI)
Published By: Aventri     Published Date: Aug 14, 2018
"Revenue focused executives have four metrics that determine their success or failure: number of opportunities, size of opportunities, win rate, and speed to revenue. All teams work together to make sure that they achieve these goals and that they have the processes in place to optimize around them. Event management software is one piece of the puzzle that is designed to generate revenue. Read this eBook to see how event management software helps to speed up the buying process and win more deals!"
Tags : 
    
Aventri
Published By: Aventri     Published Date: Apr 29, 2019
"Revenue focused executives have four metrics that determine their success or failure: number of opportunities, size of opportunities, win rate, and speed to revenue. All teams work together to make sure that they achieve these goals and that they have the processes in place to optimize around them. Event management software is one piece of the puzzle that is designed to generate revenue. Read this eBook to see how event management software helps to speed up the buying process and win more deals!"
Tags : 
    
Aventri
Published By: AlienVault     Published Date: Oct 20, 2017
In this report, you'll read 451 Research's review of AlienVault USM Anywhere. USM Anywhere is AlienVault's offering of centralized security information and event management for resource-constrained organizations embracing Amazon and Microsoft cloud architectures. The report covers the following areas: • 451's overview of AlienVault USM Anywhere • A brief look at the history of AlienVault • How USM Anywhere compares to competitors • A SWOT analysis of USM Anywhere Download the report now to learn more about AlienVault's unique approach to threat detection in cloud and hybrid cloud environments
Tags : 
    
AlienVault
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Splunk     Published Date: Sep 10, 2018
collectd is an open source daemon that collects system and application performance metrics. With this data, collectd then has the ability to work alongside other tools to help identify trends, issues and relationships not easily observable. Read this e-book to get a deep dive into what collectd is and how you can begin incorporating it into your organization’s environment.
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: Technolytics     Published Date: Oct 05, 2007
Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.
Tags : 
spy ops, spy-ops, cyber attack, hacker, hackers, government, internet security, national security, network security, intrusion, intrusion detection, intrusion prevention, trojan, risk management, cyberwarfare, cyber warfare, technolytics
    
Technolytics
Published By: McAfee     Published Date: Feb 06, 2013
It’s a critical time for security efforts to move beyond the traditional software operating stack and monitor operations from a new vantage point closer to, and within, the hardware level.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss, ssdt, hardware assisted security, hardware enhanced security, zero-day malware, zero-day rootkit, kernel layer security
    
McAfee
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
This white paper outlines a framework that emphasizes digitization and business transformation and the new opportunities pull processes bring. The mechanism of “Pull” processes—those triggered by an actual event instead of a forecast—is nothing new. It is at the heart of many successful manufacturing strategies. Recent technological advances in digitization, including the harnessing of Big Data analytics, the use of the cloud, Business Process Management (BPM), social media, IIoT, and mobility, have extended the power of Pull beyond Lean manufacturing. In the wake of the current technological innovation wave, it is not uncommon for manufacturers to not know what next step to take. In light of these new developments, this white paper will focus on the mechanism of business transformation enabled by these technologies, which can be attributed to two major forces: the power of Pull and digitization. Nine practical applications are detailed, showing how innovative manufacturers can better
Tags : 
    
Dassault Systèmes
Published By: Riverbed     Published Date: Nov 02, 2016
When apps run efficiently, employees are more likely to use them. The promise of unified communications (UC) is that it is supposed to increase efficiencies and make internal operations more seamless. But that only happens when it’s working properly. According to Robin Gareiss, president and founder of Nemertes Research, “Companies devote 33% more IT staff to managing IP telephony and 31% more to UC when they don’t use monitoring tools. The tools are instrumental to identifying, isolating, and resolving performance issues—and preventing them from happening again. When apps run efficiently, employees are more likely to use them.” That’s one reason 36% more people actually use UC in large companies that use monitoring tools. Join Robin Gareiss, president and founder, Nemertes Research and David Roberts, director of product management, Riverbed, as they explore the different approaches to monitoring UC—network probes vs endpoint telemetry—and why taking a combined approach hel
Tags : 
    
Riverbed
Published By: Riverbed     Published Date: Jan 25, 2018
"When apps run efficiently, employees are more likely to use them.” The promise of unified communications (UC) is that it is supposed to increase efficiencies and make internal operations more seamless. But that only happens when it’s working properly. According to Robin Gareiss, president and founder of Nemertes Research, “Companies devote 33% more IT staff to managing IP telephony and 31% more to UC when they don’t use monitoring tools. The tools are instrumental to identifying, isolating, and resolving performance issues—and preventing them from happening again. When apps run efficiently, employees are more likely to use them.” That’s one reason 36% more people actually use UC in large companies that use monitoring tools. Join Robin Gareiss, president and founder, Nemertes Research and David Roberts, director of product management, Riverbed, as they explore the different approaches to monitoring UC—network probes vs endpoint telemetry—and why taking a combined approach helps you
Tags : 
    
Riverbed
Published By: Tripwire, Inc     Published Date: Mar 10, 2010
NERC enforces comprehensive reliability standards for planning and operating the collective bulk power system, including the Critical Infrastructure Protection (CIP) Cyber Security Standards.
Tags : 
tripwire, nerc compliance, it security, automation, cip, cyber security, reliability standard, log, event management
    
Tripwire, Inc
Published By: SAS     Published Date: Mar 06, 2018
As explored in this paper, the SAS Fraud Framework supports a complete, modular, enterprise-level program integrity solution that helps payers prevent, detect and manage fraud, waste and abuse across all silos and lines of business. Its fully integrated components offer both top-down and bottom-up functionality for exposing hidden and risky networks. This approach gives payers enhanced detection capabilities, greater insight into case management and improved operational efficiency while decreasing overall cost of ownership. The result is highly effective, early, and even preventative detection of fraud, waste, abuse and corruption that improves operational efficiency and reduces health care costs.
Tags : 
    
SAS
Published By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : 
qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity, zero-day attacks, it systems, security, data security, resiliency layers, hardened assets, identification
    
Qualys
Published By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : 
ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager, encryption management
    
IBM
Published By: GFI Software     Published Date: Mar 21, 2011
This white paper examines the necessary requirements to adhere to PCI DSS, the implications of non-compliance as well as how effective event log management and network vulnerability management play a key role in achieving compliance.
Tags : 
gfi, pci dss, credit card, event log management, network vulnerability management, compliance
    
GFI Software
Published By: Splunk     Published Date: Aug 17, 2018
Imagine a world where incident alerts arrive 30 minutes before problems even begin — you’d actually have the power to prevent outages and deliver a truly seamless experience to your customers. Sound impossible? Think again — the right AIOps (Artificial Intelligence for IT Operations) solution can help you maintain uptime, reduce manual incident-management tasks and increase productivity.
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: LogLogic     Published Date: Mar 15, 2012
"Big Data" is the latest buzzword, yet over 70% of companies don't know what Big Data means and how to solve the data management challenges, finds LogLogic survey.
Tags : 
log management, siem, big data, storage, sem, pci compliance, it operations, data storage, data forensics, security intelligence, splunk, rsa envision, logrhythm, arcsight, compliance, hipaa, nitro security, q1 labs, security event management, syslog
    
LogLogic
Published By: Progress Software Corporation CEP     Published Date: Mar 26, 2008
We all have an intuitive idea of what an event is. However, when it comes to the use of the term "event" within a business context then it is easy to get confused. This papers seeks to explain what events are, whey they are important to your business, and what the options are for processing and managing these events (depending on their type and volume).
Tags : 
bloor, progressive, software, complex event processing, cep, mission critical, rules-and-model, event pattern, detection, bpm, business process management, latency, soa, smartblocks, apama, correlator, event processing technical society, epts, rfid, scada
    
Progress Software Corporation CEP
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.