Mining enterprise SIM logs for relevant security event data

SIM products can be tremendously useful, but only if they offer information in a clear, concise manner. Given the complex nature of today's enterprise networks and the massive amount of information that SIMs can harvest, too much data can be worse than not enough. Adrian Lane explains how to get the most valuable data from a security information management system.

This Content Component encountered an error

Dig Deeper

PRO+

Content

Find more PRO+ content and other member only offers, here.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close