was successfully added to your cart.

Cart

Category

SIEM

Security Industry Turning to Big Data to Accelerate Analysis of Event and Log Data

By | Security, SIEM, Threat Assessment | No Comments

Yesterday I broke away from my normal routine of analyzing enterprise data protection and data storage technologies to take a closer look at enterprise security. To do so, I stopped by the Omaha Tech Security Conference held at the local Hilton Omaha conference center and visited some of the vendors’ booths to learn more about their respective technologies. In so doing, it quickly became evident from my conversations with a number of security providers that they recognize their need to introduce Big Data analytics into their products to convert the data, events, and incidents that they record and log into meaningful analysis that organizations can consume and act upon.

Read More

DCIG 2014-15 Security Information and Event Management (SIEM) Appliance Buyer’s Guide Now Available

By | Buyer's Guides, Governance Risk and Compliance, Information Classification, Information Governance, Litigation Readiness, Security, SIEM, Threat Assessment | No Comments

DCIG is pleased to announce the availability of its DCIG 2014-15 Security Information and Event Management (SIEM) Appliance Buyer’s Guide. In this Buyer’s Guide, DCIG weights, scores and ranks 29 SIEM appliances respectively from nine (9) different providers. Like all previous DCIG Buyer’s Guides, this Buyer’s Guide provides the critical information that all size organizations need when selecting a SIEM appliance to help provide visibility into their security posture by providing usable and actionable information.

Read More
image_pdfimage_print
Bitnami