event correlation

Results 1 - 13 of 13Sort Results By: Published Date | Title | Company Name
Published By: Splunk     Published Date: Aug 17, 2018
Imagine a world where incident alerts arrive 30 minutes before problems even begin — you’d actually have the power to prevent outages and deliver a truly seamless experience to your customers. Sound impossible? Think again — the right AIOps (Artificial Intelligence for IT Operations) solution can help you maintain uptime, reduce manual incident-management tasks and increase productivity.
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: Splunk     Published Date: Aug 17, 2018
IT organizations are now responsible for delivering seamless customer experiences while preventing outages and managing an increasing number of systems. With growing responsibility placed on IT, there is an opportunity to drive strategy for company-wide business processes and operations. Companies using machine data powered platforms like Splunk collect disparate data types to quickly troubleshoot and monitor systems. By adding predictive capabilities, IT can glean critical insights for the business and develop strategic initiatives on issues that matter. Download the white paper “Embracing the Strategic Opportunity of IT” to learn how to: Enable a business aware IT organization Unlock operational efficiencies Solve problems with predictive analytics
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: Splunk     Published Date: Aug 22, 2018
The world of artificial intelligence (AI) has finally arrived at the doorstep of IT operations. As organizations move toward using both big data and machine learning functionality to support a variety of IT operations, processes and tasks, artificial intelligence for IT operations (AIOps) platforms have emerged as a one-stop solution. Gartner has released a “Market Guide for AIOps Platforms” that provides findings about the AIOps industry and its latest developments. Download your complimentary copy to: *Gain insight into the developing industry of AIOps and its future *Learn how to optimize IT operations powered by machine learning to drive business value *Compare different AIOps platform vendors and their range of capabilities
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: Splunk     Published Date: Sep 10, 2018
collectd is an open source daemon that collects system and application performance metrics. With this data, collectd then has the ability to work alongside other tools to help identify trends, issues and relationships not easily observable. Read this e-book to get a deep dive into what collectd is and how you can begin incorporating it into your organization’s environment.
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: BMC ESM     Published Date: Nov 09, 2009
Gartner assesses the vendor landscape in their latest Magic Quadrant for IT Event Correlation and Analysis, and positions BMC in the Leaders' Quadrant. Read the report
Tags : 
bmc esm, magic quadrant, consolidation, eca, event correlation and analysis, business service management, event management, deduplication
    
BMC ESM
Published By: AT&T     Published Date: Jul 28, 2015
Download this white paper to learn more about AT&T Threat Manager – with Advanced Log Management, a security logging and event correlation monitoring solution for any size organization.
Tags : 
threat manager, at&t, advanced log management, security logging, event correlation monitoring, hackers, cybersecurity
    
AT&T
Published By: TriGeo Network Security     Published Date: Oct 03, 2008
It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. What’s surprising to many is that this technology can play a significant role in actively defending networks. This whitepaper explains precisely how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide unprecedented network visibility, security and control.
Tags : 
trigeo whitepaper, siem, log management, security event management, automated remediation, active response, correlation, compliance, proactive network security, security, data management
    
TriGeo Network Security
Published By: McAfee     Published Date: Apr 16, 2014
This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting.
Tags : 
sans, siem, information and event correlation, critical security controls, reporting, security
    
McAfee
Published By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: NitroSecurity     Published Date: Aug 21, 2009
NitroSecurity's Security Event Aggregation and Correlation Engine (N-SEAC) is a patented, key differentiator of the NitroSecurity IPS solution. It allows enterprise customers the ability to collect and analyze threat information more efficiently and in an accurate and timely manner.
Tags : 
intrusion prevention, ips, n-seac, intrusion detection, ids, security management, nitrosecurity, nitro security, security
    
NitroSecurity
Published By: AlienVault     Published Date: Aug 11, 2015
Read this paper to accelerate your evaluation of SOC tools and technology needs.
Tags : 
security operations center, soc, threat detection, soc tools, siem event correlation, security management, behavior monitoring, threat assessment, asset management, breach prevention
    
AlienVault
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com