sans

Results 76 - 100 of 169Sort Results By: Published Date | Title | Company Name
By: LogRhythm     Published Date: Jan 24, 2013
A SANS functional product review of LogRhythm version 6.1, conducted by senior SANS Analyst Dave Shackleford. It shows LogRhythm's SIEM toolset capable of analyzing and reporting on security data in many differed ways with easy-to-use features.
Tags : security intelligence, review of log rhythm, big data security, analytics platform, sans, logrhythm, siem toolset, security
     LogRhythm
By: Aruba Networks     Published Date: Nov 15, 2013
Le standard de transmission 802.11ac est en passe de devenir la norme du Wifi nouvelle génération. La vitesse gigabit et l’amélioration des capacités et de la fiabilité offertes par le standard 802.11ac aux réseaux LAN sans fil (WLAN) se révèlent être d’inestimables atouts face à la croissance rapide du nombre d’utilisateurs, d’appareils et d’applications mobiles. Que vous soyez un adepte précoce ayant déjà commencé à tout planifier ou, comme bon nombre d’entreprises, encore hésitant concernant la marche à suivre, n’hésitez pas à télécharger ce guide en cinq étapes qui vous aidera à préparer et à planifier une migration réussie vers un réseau WLAN 802.11ac.
Tags : just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage
     Aruba Networks
By: CA Technologies EMEA     Published Date: May 24, 2018
In seinem Buch „Die Psychologie der Wissenschaft“ von 1966 vertrat der US-Psychologe Abraham Maslow die Position, dass Psychologen multiperspektivische Behandlungsansätze verfolgen und neue Konzepte einführen sollten, statt weiter nur die Theorien von Verfahren anzuwenden, die Freud und seine Nachfolger vor langer Zeit entwickelt hatten. Maslow wusste, dass es schwierig ist, einen neuen Blickwinkel einzunehmen, und schreibt: „Es ist bestechend, in jedem Problem einen Nagel zu sehen, wenn man als Werkzeug nur einen Hammer hat.“ Wir alle kennen das. Wir gewöhnen uns so sehr an althergebrachte Abläufe, dass wir die Gründe dafür manchmal nicht infrage stellen.
Tags : 
     CA Technologies EMEA
By: Tenable     Published Date: Jan 25, 2019
"This whitepaper from the SANS Institute focuses on the growing use and benefits derived from information technology (IT) and operational technology (OT) convergence which includes more effective management and operation of contemporary control systems. IT/OT convergence carries unique challenges that make managing and securing an industrial control system (ICS) more difficult. This is due to greater technical complexity, expanded risks and new threats to more than just business operations. This paper explores the issues that arise with the blending of IT and OT into combined cyber-physical systems where risks must be identifed and managed. Download this report to get answers to these questions: -Why are digital asset inventories critical for IT/OT security risk management? -How does knowledge about risks and vulnerabilities to IT/OT systems lead to better risk management? -Can applying even a few of Center for Internet Security (CIS) Controls make a marked difference in the securit
Tags : 
     Tenable
By: LogRhythm     Published Date: Nov 16, 2011
This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.
Tags : security, compliance, threats, insider threats, monitor, monitoring, attack, security
     LogRhythm
By: PC Mall     Published Date: Mar 02, 2011
This white paper describes the advantages of scale-out iSCSI storage in four areas-cost, high availability and disaster recovery, performance, and management-and illustrates how SANs provide better overall support for virtualized environments.
Tags : pc mall, storage, server virtualization, performance management, iscsi, sans, disaster recovery
     PC Mall
By: PC Mall     Published Date: Mar 21, 2011
This white paper describes the advantages of scale-out iSCSI storage in four areas-cost, high availability and disaster recovery, performance, and management-and illustrates how SANs provide better overall support for virtualized environments.
Tags : iscsi, storage, server virtualization, san
     PC Mall
By: McAfee     Published Date: Jul 24, 2013
SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Tags : siem, data storage, event analysis, attacks, forensic analysis, security, data management
     McAfee
By: McAfee     Published Date: Apr 16, 2014
SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Tags : siem, data storage, event analysis, attacks, forensic analysis, security
     McAfee
By: McAfee     Published Date: Apr 16, 2014
This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting.
Tags : sans, siem, information and event correlation, critical security controls, reporting, security
     McAfee
By: McAfee     Published Date: Apr 16, 2014
SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.
Tags : siem, sans, endpoint, network, correlation, integration, security
     McAfee
By: McAfee     Published Date: Oct 28, 2014
SANS recently surveyed incident response (IR) teams to get a clearer picture of what they're up against today. The results are in; most organizations lack formalized IR plans, they expressed a need to collect and correlate threat intelligence and SIEM tools are their focus for improving IR capabilities.
Tags : siem, incident response, ir capabilities, ir obstacles, threat intelligence, detection and remediation, data breach, security
     McAfee
By: McAfee     Published Date: Nov 20, 2014
How do we get more visibility into attacks across our environments, improve our response, and reduce response time? SANS Analyst, James Tarala, provides insight on the solution by automating functions that should be automated and connecting the dots between detection systems and response. Connecting these dots and applying intelligence provides responders rich context into the observed behaviors for taking action. Integrating these processes improves accuracy, while reducing time, manpower, and costs involved in detecting and managing events. This white paper explores how to achieve this.
Tags : sans, incident response, detection systems, data correlation and aggregration, siem, security analytics tools, security
     McAfee
By: McAfee     Published Date: Nov 20, 2014
This paper is the result of a recent SANS survey exploring the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.
Tags : siem, threat intelligence, platform integration, correlation and analysis, third-party intelligence tools, security
     McAfee
By: LogRhythm     Published Date: Jun 19, 2018
In today’s fast-paced threat environment, speed to detect and respond is critical. Yet, according to multiple SANS surveys,1 analysts are finding it difficult to keep up with the speed in which hackers attack their systems.
Tags : logrhythm, scalability, hackers, systems, scripts
     LogRhythm
By: LogRhythm     Published Date: Jun 19, 2018
As in years past, 2017 was packed with stories of cyber security failure. Between sophisticated attackers, lack of proper security monitoring and controls implementation, and devastating data breaches that may have arisen from these scenarios, it’s easy to see that we still face serious challenges in the security arena, with potentially serious consequences. Why are we continually seeing these issues? Many security professionals readily admit that we don’t have the staff, training and breadth of coverage in our security controls to adequately combat the attackers today. How is this happening when we’re spending so much money and time on cyber security?
Tags : logrhythm, sans, cloudai, ueba
     LogRhythm
By: RES Software     Published Date: Apr 08, 2013
Afin de répondre aux demandes de nouvelles fonctionnalités, d’économies et d’amélioration de la qualité (d’intégrité et de performance, par exemple), les infrastructures des postes de travail sont en constante évolution. Aujourd’hui, de tels changements ont une incidence quasi systématique sur les conditions d’utilisation des postes. Ce livre blanc décrit les concepts de transformation des postes et comment la technologie de transformation des postes de travail peut aider les entreprises à réussir leur transition vers des espaces de travail utilisateur administrés sans préjudice pour la productivité de l’utilisateur.
Tags : 
     RES Software
By: Extreme Networks     Published Date: Sep 26, 2014
Les établissements hospitaliers sont aujourd’hui soumis à des pressions financières et techniques pour améliorer le traitement du patient et augmenter leur productivité. Un réseau filaire et Wi-Fi hautement sécurité et fiable est le minima requis pour supporter les données, la voix, la vidéo et les équipements et les applications métiers. Mais comment garantir continuité de service et connectivité Wi-Fi pervasive pour supporter ces éléments clés au meilleur coût ? Ce livre blanc vous guide grâce aux témoignages de professionnels de l’IT au sein de grands établissements hospitaliers. Ils y expliquent comment ils ont relevé le challenge de la mobilité en garantissant la sécurité de leurs patients.
Tags : extreme networks, wifi, byod, réseau sans fil, réseau hôpitaux, mobilité, réseau, purview
     Extreme Networks
By: McAfee EMEA     Published Date: Mar 14, 2018
Use of cloud computing services continues to grow rapidly as organizations migrate business applications and data to cloud-based software, platform and infrastructure services. Gartner estimates 2017 will see growth of 18% in spending on public cloud services and that cloud adoption will infuence more than 50% of IT spending through 2020. Deloitte Global predicts that by the end of 2022 more than half of all IT spending will go to IT-as-a-service providers. In the 2016 edition of this survey, 56% of the security professionals responding said limitations on access to collect incident response data and evidence for forensic analysis was a key challenge to securing the cloud. Sixty-two percent said they were concerned about unauthorized access by outsiders, and 59% said they worried about access by other cloud tenants. Of the 10% who reported being breached, half blamed stolen credentials or compromised accounts.
Tags : 
     McAfee EMEA
By: Dell Windows Server     Published Date: Jan 16, 2009
Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Upgrading to the Windows Server 2008 OS can offer myriad advantages, including enhanced performance, security, and stability. By following best practices for in-place upgrades and taking advantage of tools such as the Dell Windows Server 2008 Readiness Advisor, administrators can help ensure a smooth migration on their Dell PowerEdge™ servers.
Tags : dell, migrating dell poweredge, microsoft windows server 2008, platforms
     Dell Windows Server
By: Dell Storage     Published Date: Jan 16, 2009
With the advent of iSCSI as the standard for networked storage, businesses can leverage existing skills and network infrastructure to create Ethernet-based SANs that deliver the performance of Fibre Channel—but at a fraction of the cost. iSCSI enables block-level data to be transported between a server and a storage device over an IP network. An iSCSI initiator is hardware or software that runs on a host and initiates I/O to an iSCSI target, which is a storage device (usually, a logical volume) that responds to read/write requests.
Tags : dell, iscsi, networked storage, initiator implementations, block-level data, fibre channel, storage
     Dell Storage
By: Dell Storage     Published Date: Jan 16, 2009
Storage area networks (SAN) deliver consolidated storage and advanced storage management features. One advanced SAN configuration involves booting servers directly from the SAN, eliminating all locally attached storage, and improving server operations. Several server boot options are available. To select the right boot option for your environment, you should weigh the benefits and drawbacks of each.
Tags : dell, san, storage area networks, consolidated storage, storage management, san configuration, server operations, storage
     Dell Storage
By: Dell Storage     Published Date: Jan 16, 2009
System reliability is a vital component in Storage Area Network (SAN) design that keeps your production environment operating and avoids data loss and downtime. But since SANs are built using both mechanical and electronic parts, component failures due to usage, environmental factors, or manufacturing defects are not uncommon. Even in completely redundant systems, controllers can fail, fans can stop operating, power supplies can burn out, and disk drives can degrade or fail.
Tags : dell, san, storage area networks, component failures, data loss, reliable san, building san, raid
     Dell Storage
By: Cisco     Published Date: Jan 28, 2009
Building a small office network means starting with a foundation of switches and routers. The following guide will help you understand the difference between switches and routers and develop a clear vision for what your network foundation needs. Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;}
Tags : small office network, cisco, switches, routers, multiple devices, multiple networks, integrated messaging, voip
     Cisco
By: McAfee     Published Date: Jan 28, 2014
SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.
Tags : siem, sans, endpoint, network, correlation, integration
     McAfee
Start   Previous    1 2 3 4 5 6 7    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com