Security analytics News
November 30, 2016
Hewlett Packard Enterprise has reached what the firm thinks is a milestone for software application developers interested in cutting edge infrastructure, data-centric computing and software-defined ...
November 15, 2016
SonicWall reflects on the benefits of spinning out of Dell and how it's reengineering its channel focus and product roadmap to match the speed of the security market.
October 31, 2016
Certificate transparency compliance will be mandatory for publicly trusted website certificates in order to be considered secure by Google's Chrome browser.
September 23, 2016
Yahoo confirmed it was the victim of one of the largest breaches in history two years ago, when information on at least 500 million user accounts was stolen.
Security analytics Get Started
Bring yourself up to speed with our introductory content
The security analysis tools that provide advanced analytics are essential to counter the latest threats to enterprise systems and data. These products gather and analyze data from many different sources within an organization, and they provide essential insights that help IT security teams and corporate management make more informed decisions regarding IT operations and business services.
This e-publication looks at available advanced security analysis tools. In three parts, this guide zeroes in on the many categories of security analysis tools, including behavioral threat analytics, big data analytics, predictive analytics and more. It outlines the reasons these advanced tools are necessary in this era of big data. It also outlines how advanced security analysis differs from threat assessments of the past and how advanced security allows infosec pros to automate many security analysis actions that are just too big or complex to conduct manually. Finally, find out how companies using big data security analytics are reporting its business benefit.
Readers of this publication will come away with a deeper understanding of the need for advanced security analysis tools and how to identify the tool best suited for their enterprise.Continue Reading
Advanced security analytics uses information gathered from SIEMs and other security tools to safeguard the enterprise. Learn how advanced analytics works and what's coming next. Continue Reading
TPS was a useful memory management feature until VMware turned it off over security concerns. Fortunately, you can restore its full functionality with a few simple steps. Continue Reading
Evaluate Security analytics Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
In this excerpt from chapter Z of Information Security Analytics, authors Mark Ryan Talabis, Robert McPherson, Inez Miyamoto and Jason L. Martin discuss security intelligence. Continue Reading
From decreased revenues to a decrease in skills demand, VMware has taken some hits in 2016. But these tips prove the software company isn't giving up. Continue Reading
In this episode of SearchSecurity's Risk & Repeat podcast, Tod Beardsley and Rebekah Brown of Rapid7 talk about the IoT threat landscape and improving IoT device security. Continue Reading
Manage Security analytics
Learn to apply best practices and optimize your operations.
Meeting top security goals is only the first step. Get up to speed on how to avoid common pitfalls in the use of threat intelligence and analytics. Continue Reading
In order to achieve interoperability of security tools and strengthen security, one CIO said that there must be security standards for healthcare information systems. Continue Reading
Experts predict blockchain will change the nature of financial and other transactions. In this SearchCIO blockchain tutorial, learn the whats, whys and hows of the technology. Continue Reading
Problem Solve Security analytics Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A security portfolio shouldn't be used as an alternative to a reporting structure, but it can still be beneficial to enterprises. Expert Mike O. Villegas explains how. Continue Reading
Citrix shops looking to enable secure remote access can employ the SmartAccess feature in XenApp and XenDesktop to require endpoint analysis using the company's NetScaler Gateway delivery controller. Continue Reading
Security expert Ed Moyle explains the CSA STAR certification program and how enterprises can use it to improve cloud provider security evaluations. Continue Reading