Research Library

Powered by

Aug 31, 2012
Jul 5, 2012
14 Page(s)
Analyst Report

See all research from

  • Advanced cyber-security intelligence

    Sponsored by:


    By Bob Tarzey and Clive Longbottom



    Real time defence of business data and IT users through the use of next generation security information and event management (SIEM).


    Traditional IT security defences have been built using point security products. These are good for protecting against specific threats; for example firewalls limit access to networks, anti-virus software detects malware on given devices and encryption protects stored data.


    However, cyber security threats have now emerged that can only be detected by correlating information from a wide range of sources, including point security products themselves.


    Most organisations already have much of the required data to achieve this but not the tools needed to process it. This has led to the emergence of next generation SIEM (security information and event management) tools.


    These enable the real time correlation of IT intelligence data and for many advanced threats to be foiled or pre-empted that would have been previously undetectable.


    This report presents a value proposition for investing in next generation SIEM tools. It should be of interest to any business, security or IT manager that wants to get ahead in the security stakes and make their organisation less likely to be a victim than the next one.


    Click on the button below to download this report




    Quocirca is a research and analysis company specialising in the business impact of information technology and communications.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.