ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Event Correlation Research

  • Intervention areas for superfast broadband project Connecting Cumbria

    Sponsored by: ComputerWeekly.com

    UK broadband roll-out: Download this Excel spreadsheet detailing the intervention status of postcodes across Cumbria

  • WAN Speak Musings – Volume I

    Sponsored by: ComputerWeekly.com

    Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.

  • Effective Ways to Search Log Files

    Sponsored by: SearchSecurity.com

    Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.

  • E-Guide: Securing the SIEM system: Control access, prioritize availability

    Sponsored by: SearchSecurity.com

    Given the vital role a security information and event management (SIEM) system plays in an organization’s security infrastructure, a compromised or crashed system can mean devastating consequences. This e-guide explores the serious implications of a corrupted SIEM system and offers helpful tips on how to secure them.

  • Log management best practices

    Sponsored by: SearchSecurity.com

    Investing in the correct log management tool can ensure that the pressures of maintaining enterprise system log data are greatly decreased. Although the right tool is very helpful, the possibility of it turning into the wrong tool can happen in the blink of an eye if the correct steps are not taken.

  • E-Guide: Selecting a SIM for midmarket business

    Sponsored by: SearchSecurity.com

    This expert E-Guide discusses the evolvement of SIM tools, differences in deployment processes and top requirements you should consider before making a decision.

  • Automation in the Software-Defined Network

    Sponsored by: VMware and Circle IT

    In this e-guide, analyst Lee Doyle explains how software-defined networking (SDN) allows today's networks to keep pace with automation and DevOps demands -- leading to lower costs, faster provisioning and better scalability. Also inside, analyst John Burke shares how you can assess the benefits of SDN in your network.

  • Automation in the Software-Defined Network

    Sponsored by: VMware and Presidio

    In this e-guide, analyst Lee Doyle explains how software-defined networking (SDN) allows today's networks to keep pace with automation and DevOps demands -- leading to lower costs, faster provisioning and better scalability. Also inside, analyst John Burke shares how you can assess the benefits of SDN in your network.

  • Computer Weekly – 19 March 2013: Delivering software development success

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.

  • The changing SIEM landscape: What you should know to stay ahead

    Sponsored by: SearchSecurity.com

    While SIEM systems are often expensive and complex, they play a vital part in your risk and compliance strategy. This technical guide on SIM explores SIEM technologies today and offers exclusive tips and considerations for your deployment.

  • Continuous Monitoring: Responding to New Threats in More Complex IT Environments

    Sponsored by: Tripwire, Inc.

    Governments today are focusing on the practice of continuous monitoring as a means to providing the much needed balance between data access and protection. In this paper, learn more about continuous monitoring, including what is it and why it’s needed, guidelines for implementing it, key capabilities of an effective solution, and more.

  • Tripwire IT Security & Compliance Automation Solutions –Empowering IT Security in an Insecure World

    Sponsored by: Tripwire, Inc.

    In this solution brief, discover how Tripwire IT security and compliance automation solutions provides the visibility, intelligence and automation of IT security controls needed to gain confidence in the protection of your data.

  • Information Security IT Decision Checklist: Security Information and Event Management

    Sponsored by: ArcSight, an HP Company

    This Information Security IT Decision Checklist explores key business and technical areas you should consider before selecting a security information and event management system. Also included in this guide is a list of SIMs and log management vendors to help in your decision process.

  • Orion Network Performance Monitor

    Sponsored by: SolarWinds, Inc.

    Traditional framework solutions are expensive and tough to implement; are difficult to use, maintain and customize; and often impractical for network engineers in mid- to large-sized organizations. Network engineers need affordable, scalable network management solutions that provide immediate visibility into performance of the entire network.

  • The Need for Effective Event Management

    Sponsored by: GFI Software

    This paper examines various corporate needs and provides information on how GFI EventsManager can help corporations achieve important goals.

  • GFI EventsManager

    Sponsored by: GFI Software

    GFI EventsManager collects data from all devices that use Windows event logs, W3C, and Syslog and applies the best rules and filtering in the industry to identify key data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.