ComputerWeekly.com Research Library

Powered by Bitpipe.com

Posted:
Aug 31, 2012
Published:
Jul 5, 2012
Format:
PDF
Length:
14 Page(s)
Type:
Analyst Report
Language:
English

See all research from ComputerWeekly.com

  • Advanced cyber-security intelligence

    Sponsored by: ComputerWeekly.com

     

    By Bob Tarzey and Clive Longbottom

     

     

    Real time defence of business data and IT users through the use of next generation security information and event management (SIEM).

     

    Traditional IT security defences have been built using point security products. These are good for protecting against specific threats; for example firewalls limit access to networks, anti-virus software detects malware on given devices and encryption protects stored data.

     

    However, cyber security threats have now emerged that can only be detected by correlating information from a wide range of sources, including point security products themselves.

     

    Most organisations already have much of the required data to achieve this but not the tools needed to process it. This has led to the emergence of next generation SIEM (security information and event management) tools.

     

    These enable the real time correlation of IT intelligence data and for many advanced threats to be foiled or pre-empted that would have been previously undetectable.

     

    This report presents a value proposition for investing in next generation SIEM tools. It should be of interest to any business, security or IT manager that wants to get ahead in the security stakes and make their organisation less likely to be a victim than the next one.

     

    Click on the button below to download this report

     

     

     

    Quocirca is a research and analysis company specialising in the business impact of information technology and communications.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.