dcsimg

Network Security - Article Archives - Page 3

IBM Security QRadar - SIEM Product Overview and Insight

November 02, 2018 |

We review IBM Security QRadar SIEM, which boasts more than 500 support modules for ingesting data and can process millions of security events per second.

READ MORE

Trustwave SIEM Enterprise - SIEM Product Overview and Insight

November 01, 2018 |

An in-depth look at Trustwave SIEM Enterprise and Log Management Enterprise, hybrid SIEM solutions for the mid-market and enterprise.

READ MORE

McAfee Enterprise Security Manager (ESM) - SIEM Product Overview and Insight

October 31, 2018 |

We take an in-depth look at McAfee Enterprise Security Manager (ESM), which processes tens of thousands of events per second and can store billions of events and flows.

READ MORE

Micro Focus Sentinel Enterprise - SIEM Product Overview and Insight

October 29, 2018 |

We take an in-depth look at Micro Focus Sentinel Enterprise, a SIEM aimed at managed security services providers (MSSPs) and enterprises with distributed IT environments.

READ MORE

Micro Focus ArcSight - SIEM Product Overview and Insight

October 22, 2018 |

We review Micro Focus ArcSight, an enterprise-class SIEM system that can ingest data from more than 300 sources and process up to 100,000 security events per second.

READ MORE

AlienVault Unified Security Management (USM) - SIEM Product Overview and Insight

October 18, 2018 |

We review AlienVault Unified Security Management (USM), a lower-cost SIEM option thanks to its open source Open Threat Exchange (OTX).

READ MORE

Think Like a Hacker: An Offensive Approach to Enterprise Security

October 15, 2018 |

Find out how the CISO of an infamously breached website uses an Offensive Risk Management approach to improve the security of his organization.

READ MORE

LogRhythm - SIEM Product Overview and Insight

October 11, 2018 |

We take an in-depth look at LogRhythm SIEM, which unifies SIEM, log management, security analytics, network and endpoint monitoring and forensics.

READ MORE

Breach and Attack Simulation: Find Vulnerabilities before the Bad Guys Do

October 08, 2018 |

This new IT security testing technology continually monitors networks and systems to help organizations determine how secure their environment is.

READ MORE

Splunk Enterprise Security (ES) - SIEM Product Overview and Insight

October 05, 2018 |

Splunk Enterprise Security (ES) SIEM shows Splunk's origins in operations intelligence, including integration with the company's User Behavior Analytics (UBA) and Machine Learning toolkit.

READ MORE

SIEM Guide: A Comprehensive View of Security Information and Event Management Tools

September 24, 2018 |

Security Information and Event Management (SIEM) tools monitor logs from network hardware and software to spot security threats, detect and prevent breaches, and provide forensic analysis. Learn everything you need to know to implement a SIEM system.

READ MORE

The IT Security Mistakes that Led to the Equifax Breach

September 17, 2018 |

Patching failures alone didn't lead to the massive data breach at Equifax. Here are a half-dozen other mistakes that Equifax made that IT security teams should learn from.

READ MORE

8 Ways Security Automation and Orchestration Is Transforming Security Operations

September 05, 2018 |

Enterprises are turning to SOAR solutions to streamline response to cybersecurity incidents.

READ MORE

Ten Top Next-Generation Firewall (NGFW) Vendors

August 16, 2018 |

Next-generation firewalls are essential to IT security. We review ten of the best.

READ MORE

10 Top Unified Threat Management Vendors

July 23, 2018 |

UTM appliances offer a quick path to comprehensive security for SMBs, but features differ among vendors. Here's a comprehensive look at top UTM solutions.

READ MORE

Is a UTM Appliance the Right Security Solution for Your Business?

July 12, 2018 |

A unified threat management device can make security much easier and cheaper for SMBs. But picking the right solution is a complicated task. We take you through all the considerations.

READ MORE

Where To Invest Your Cybersecurity Budget

July 03, 2018 |

VIDEO: Tom Parker, Managing Director of Accenture Security, discusses how organizations should be budgeting their cybersecurity dollars - and making the most of what they already have.

READ MORE

Sophos XG vs Fortinet FortiGate: Top NGFWs Compared

June 29, 2018 |

A look at the strengths and weaknesses of top next-generation firewall solutions from Sophos and Fortinet.

READ MORE

How to Prevent DDoS Attacks: 6 Tips to Keep Your Website Safe

June 26, 2018 |

A DDoS attack can be costly for your business, so it's best not to give the bad guys a chance. Here are 6 ways you can prevent DDoS attacks.

READ MORE

How to Stop DDoS Attacks: 6 Tips for Fighting DDoS Attacks

June 26, 2018 |

Stopping a DDoS attack quickly is critical for the survival of your business. Here are six ways you can stop a DDoS attack.

READ MORE