Drew Robb - Article Archives - Page 4

Trustwave SIEM Enterprise - SIEM Product Overview and Insight

June 5, 2017
An in-depth look at Trustwave SIEM Enterprise and Log Management Enterprise, SIEM solutions for the mid-market and enterprise that can retain data from millions of daily events for up to five years.
READ MORE

Micro Focus Sentinel Enterprise - SIEM Product Overview and Insight

June 5, 2017
We take an in-depth look at Micro Focus Sentinel Enterprise, a SIEM aimed at managed security services providers (MSSPs) and enterprises with distributed IT environments.
READ MORE

SolarWinds Log & Event Manager - SIEM Product Overview and Insight

June 5, 2017
An in-depth look at SolarWinds Log & Event Manager, an easy to use, lower-cost SIEM option that offers automated incident response.
READ MORE

LogRhythm - SIEM Product Overview and Insight

June 5, 2017
We take an in-depth look at LogRhythm SIEM, which can scale from midrange to enterprise and unifies SIEM, log management, security analytics, network and endpoint monitoring and forensics.
READ MORE

AlienVault Unified Security Management (USM) - SIEM Product Overview and Insight

June 5, 2017
We review AlienVault Unified Security Management (USM), a lower-cost SIEM option thanks to its open source Open Threat Exchange (OTX).
READ MORE

Network Firewalls: How to Protect Your Network from Unauthorized Access

April 18, 2017
They lack the buzz of more recent security innovations, so network firewalls can be overlooked. Yet firewalls are an essential aspect of any security strategy. We cover the basics of network firewall technology and look at the latest in next-generation firewalls.
READ MORE

SAS Tackles the Cybersecurity Analytics Challenge

April 14, 2017
Cybersecurity analytics is far from perfect, so data analytics pioneer SAS is hoping its expertise can help make it easier.
READ MORE

Identity and Access Management: Balancing Access and Security

April 7, 2017
In an era where hackers seem to have the upper hand, organizations can take greater control of networks and data with Identity and Access Management (IAM). We outline IAM security technology and solutions and discuss how to utilize it to protect your business.
READ MORE

Threat Intelligence and Analytics: Staying Ahead of Cyber Criminals

March 21, 2017
Threat intelligence is the best way to stay one step ahead of cyber criminals and prevent information or financial losses. We offer a thorough overview of cyber threat intelligence and how to implement it in your business.
READ MORE

Securing the Internet of Things

March 7, 2017
Internet of Things security is a nightmare in the making. Learn what smart enterprises can do to secure their IoT deployments.
READ MORE

Single Sign-On Buying Guide

December 21, 2016
Deploying a single sign-on system can improve productivity and lead to better password hygiene, but it also carries some risks.
READ MORE

Guide to Getting the Right Single Sign-on Solution

September 29, 2016
Single sign-on solutions help users cope with password pressures by enabling a single authentication event to offer access to multiple applications.
READ MORE

How to Mitigate Fourth-Party Security Risks

August 15, 2016
What do you know about your vendors' vendors? Fourth-party security risks can be serious. How can you mitigate them?
READ MORE

Advanced Threat Detection Buying Guide

September 3, 2015
Advanced threat detection offers a more proactive approach to enterprise security than traditional perimeter defenses.
READ MORE

Are Your Databases Secure? Think Again

June 16, 2015
Targeting enterprise databases is a common attack tactic, as the Anthem breach showed, yet many companies neglect database security.
READ MORE

Catching Enterprise Mobility Management Wave

May 22, 2015
While mobile device management was once all the rage, enterprises are moving to enterprise mobility management as their mobile strategies become more essential to their business.
READ MORE

10 Tips to Mitigate Data Breaches

March 16, 2015
We include a list of vendors that offer solutions that can help improve your response to security threats and data breaches.
READ MORE

Cyber Security's Big Data Problem

December 3, 2014
Big Data has rendered older security models largely obsolete. The all-in-one product approach that once served the industry well is now inadequate.
READ MORE

Whitelisting: Why and How It Works

September 24, 2014
Bad guys continually tweak malware, making it tough for traditional antivirus products to keep up. Whitelisting can help, by allowing only pre-approved applications.
READ MORE