event analysis

Results 51 - 59 of 59Sort Results By: Published Date | Title | Company Name
By: Confio     Published Date: Aug 21, 2009
DBAs are constantly challenged to increase database performance while keeping costs down. This short paper discusses Resource Mapping Methodology (RMM) which defines a systematic process for performing Wait-Event analysis to optimize database performance.
Tags : database, oracle, oracle database, database administrator, resource mapping, resource management, rmm, database performance
     Confio
By: NetIQ Corporation     Published Date: Sep 04, 2007
Discover how NetIQ Security Manager can help your organization comply with the log collection and analysis requirements within recent regulations and standards.
Tags : security management, monitoring, compliance, log management, logging, event management, hipaa, hipaa compliance
     NetIQ Corporation
By: Intellitactics     Published Date: Feb 28, 2008
Save time and money by sustaining compliance between audits. Aberdeen Group's Derek Brink describes the benefits that best in class companies achieve by taking steps to sustain compliance.
Tags : compliance, log management, security information management, sim, security event management, sem, siem, network behavior analysis
     Intellitactics
By: PdMA Corporation     Published Date: Jun 23, 2008
In this paper we present three case studies using online and offline motor analysis to prevent catastrophic motor failures. The online and offline analysis in our case studies use a battery of standard electrical tests including Current Signature Analysis (CSA) and Demodulated Current Spectrum Analysis (DCSA).
Tags : scm, battery, production, pdma
     PdMA Corporation
By: AlienVault     Published Date: Aug 11, 2015
This report talks about Gartner's Magic Quadrant for SIEM in 2015
Tags : security information, event management, magic quadrant, gartner report, siem technology, event data, correlations, user activity monitoring
     AlienVault
By: Microsoft Office 365     Published Date: Oct 14, 2016
“Hi, this is Kevin from IT. We've been notified of a virus on your department’s machines.” Add some authentic hold music, and a social-engineering attacker can trick employees into sharing company info, like passwords. Learn how to use technology and prevention strategies to guard against dumpster diving, spear phishing, and other tactics with: Real-world prevention strategies Tools to spot suspicious actions Real-time behavioral malware analysis
Tags : protection, prevention, malware, security, cyber attacks, information
     Microsoft Office 365
By: CrowdStrike     Published Date: Aug 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.Download the white paper to:?Learn how a proactive hunting strategy protects valuable data assets from a potential mega breach?Get a detailed analysis of how highly skilled human hunters pair with technology to aggressively seek out threat behaviors?Understand why integrating CrowdStrike Falcon Overwatch into an organization’s existing security resources offers the most comprehensive protection against persistent and skilled adversaries?Fi
Tags : 
     CrowdStrike
By: Gigamon     Published Date: Oct 19, 2017
Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organization’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
     Gigamon
By: Larsen & Toubro Infotech(LTI)     Published Date: May 30, 2019
US Based leading multinational mass media conglomerate had high volume of actionable tickets open for resolution and other related challenges for which LTI helped in building an event correlation system to find out the Root Cause Analysis of multiple events and analyse number of tickets. This was achieved by leveraging Mosaic Decision platform for processing. Benefits i. 60% reduction in incidents ii. 40% Time saved Download full case study.
Tags : 
     Larsen & Toubro Infotech(LTI)
Start   Previous    1 2 3     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com