Rethink how you use your SIEM product

Security Event Management

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Review: Network Intelligence's enVision

    enVision offers excellent value and is highly configurable, though typically that means you have to put a lot into it to get the most out of it. 

  • Logwatch: Taking the pain out of log analysis

    This column reviews the benefits of Logwatch, an open source security log analysis tool. 

  • Establishing a practical routine for reviewing security logs

    In this tip, security expert Lenny Zeltzer shares the joy that comes with correlating seemingly unrelated events, and offers helpful hints to make your log-reviewing efforts a success every time. 

  • The power of SIMs for visibility and compliance

    Security information management systems (SIMs) can offer visibility, control and compliance. Learn how they can help you. In addition, get tips on excelling at encryption and building your own Web app firewall. 

  • Security event management, no strings attached

    Product review: Information Security magazine's Joel Snyder says Check Point's vendor-agnostic Eventia Analyzer 2.0/Eventia Reporter is worth consideration despite limited BI options. 

  • Security Bytes: Cisco patches CS-MARS flaws

    Meanwhile, Metasploit creator H.D. Moore warns of a serious Internet Explorer flaw and Cisco may get more unwanted attention at the upcoming Black Hat conference. 

  • QRadar 5.0 offers robust SIM

    Hot Pick: SIMs are maturing to a level where they are practical and effective, and Q1 Labs has moved to the forefront with its innovative QRadar 5.0. 

  • Joel Synder on the future of intrusion defense

    This article analyzes network intrusion defense technologies and illustrates how the growth of networks with many distributed control points is creating a greater need for technological integration. Learn strategies to prepare for the future and prov... 

  • Security Blog Log: The sobering scope of data fraud

    This week bloggers worried about banks losing their grip on data, and the many ways criminals can take advantage of credit card insecurity. 

  • Information security, 'CSI' style

    A consultant to the FBI and Scotland Yard says cybersecurity professionals better be careful when they react to a network intrusion, lest they inadvertently let the crooks escape.