skip to Main Content

This page was archived on 17th February, 2022 and is no longer actively maintained.

Security analytics - Further Information

This page shows up to 100 pieces of content (newest at the top):

Cover for the Endpoint detection and response Hot Report

Endpoint detection and response

EDR supplements traditional endpoint protection by providing capabilities for threat detection and response, going beyond a traditional focus on threat prevention and protection.
Cover for The ongoing evolution of SIEM

The ongoing evolution of SIEM - the value of security insight

SIEM systems are entering a new era. Complementary technologies are creating visibility into networks that are required for actionable security insight.
Cover for Security response orchestration

Security Response Orchestration

Security response orchestration enables automated incident response when appropriate, augmented with human knowledge for better-informed decision making.
Cover for User and entity behavioural analytics

User and Entity Behavioural Analytics

UEBA technologies focus on identifying patterns of activity that are outside of the normal patterns expected in order to identify activity that could be suspicious or clearly malicious.
Cover for Overcoming the complexity gap

Overcoming the complexity gap - the role of automation in optimising network performance and security

This document describes how the complexity gap has come about and how it is impacting organisations. It then describes how automation of network security ...
Cover for Evolving uses of the kill chain framework

Evolving uses of the kill chain framework - using threat lifecycle management to defeat insider threats and ransomware

The use of a threat lifecycle management technology will provide organisations with the visibility that they need throughout all stages of the cyber kill chain
Cover for Proactive response

Proactive response - Improving efficiency and effectiveness with a security incident response platform

In an era when security incidents and data breaches are everyday news, organisations are struggling to keep up their defences.
post (Icon)

Solving the puzzle for actionable insight

Reducing the time it takes to detect and respond to cyber threats.
Cover for Security intelligence: solving the puzzle for actionable insight

Security intelligence: solving the puzzle for actionable insight

The extent of security incidents and breaches seen today is so high and so widespread that no organisation should be complacent
Cover for SolarWinds Log & Event Manager

SolarWinds Log & Event Manager - a full-functioned, yet affordable, SIEM

SolarWinds LEM provides all of the essential features required of a SIEM, but at a fraction of the cost of many competing products.
Cover for Technology evolution & its impact on security

Technology evolution & its impact on security - why the endpoint must be the new focus

Organisations will benefit from investing in security technologies that provide greater insight into activity occurring on both their networks and the systems.
Cover for Harnessing big data for security

Harnessing big data for security - what are the key considerations and capabilities?

This report discusses some of the challenges of harnessing big data security and outlines some of the key considerations and capabilities that organisations should consider.
Cover for Key considerations for security intelligence in big data

Key considerations for security intelligence in big data - what a CISO needs to know

This document discusses the need for an intelligence-driven security approach and aims to provide pointers for security executives.
Cover for The value of big data in security

The value of big data in security - leveraging big data for intelligence-led security

This paper discusses the benefits that implementing a security intelligence platform can bring and discusses the essential components that organisations should look for when selecting a system.
Cover for Log & Event Management

Log & Event Management

This paper represents a snapshot and brief summary of the log and (security) event management market.
Cover for Log and Event Management

Log and Event Management

This paper consolidates and extends a variety of reports and papers into the log and event management market (SIEM).
Cover for Log & Event Management: ArcSight

Log & Event Management: ArcSight

Log & Event Management (SIEM) is complex, with more than 20 vendors; this paper profiles ArcSight.
Cover for Log & Event Management: Trustwave

Log & Event Management: Trustwave

Log & Event Management (SIEM) is complex, with more than 20 vendors; this paper profiles Trustwave.
post (Icon)

Bribery

Bribery laws are coming to the UK, which will introduce a new area of compliance and opportunity for log management vendors
Cover for eIQ SecureVue

eIQ SecureVue

SecureVue is the most complete product in the SIEM market in terms of its breadth of data collection capabilities.
Cover for SenSage at O2 Ireland

SenSage at O2 Ireland

This case study is about the use of the Event Data Warehouse from SenSage at Telef
Cover for LogLogic

LogLogic

LogLogic is a major contender in the security and event management markets, and one of its leaders.
Cover for LogRhythm

LogRhythm

LogRhythm represents disruptive technology, since it has combined what were previously regarded as separate markets into a solution based on a single platform
Back To Top