Advanced cyber-security intelligence

Advanced cyber-security intelligence



By Bob Tarzey and Clive Longbottom



Real time defence of business data and IT users through the use of next generation security information and event management (SIEM).


Traditional IT security defences have been built using point security products. These are good for protecting against specific threats; for example firewalls limit access to networks, anti-virus software detects malware on given devices and encryption protects stored data.


However, cyber security threats have now emerged that can only be detected by correlating information from a wide range of sources, including point security products themselves.


Most organisations already have much of the required data to achieve this but not the tools needed to process it. This has led to the emergence of next generation SIEM (security information and event management) tools.


These enable the real time correlation of IT intelligence data and for many advanced threats to be foiled or pre-empted that would have been previously undetectable.


This report presents a value proposition for investing in next generation SIEM tools. It should be of interest to any business, security or IT manager that wants to get ahead in the security stakes and make their organisation less likely to be a victim than the next one.


Click on the button below to download this report




Quocirca is a research and analysis company specialising in the business impact of information technology and communications.

31 Aug 2012
05 Jul 2012
14 Page(s)
Analyst Report
Already a Bitpipe member? Login here

Download this Analyst Report!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor