Compliance Research Library

Powered by

Feb 24, 2012
Feb 23, 2012
12 Page(s)

See all research from HP Enterprise Security

  • IT Decision Checklist: Security Information and Event Management

    Sponsored by: HP Enterprise Security

    As the complexity of the networks IT manages continues to increase, so too does the volume of security-related information generated by network devices. In fact, it is not unusual for a large firm to produce more log data than the entire printed collection of the Library of Congress, all before breakfast. In this climate, security information management (SIM) tools are increasingly critical in order to maintain control.

    Access this edition of Information Security magazine for our experts' insights into choosing and successfully implementing SIM tools. Uncover the critical business and technical considerations involved in the selection process, including:

    • Integration with workflow and change management
    • Cost and staffing requirements
    • Alerting and reporting
    • Architecture and scalability
    • And more

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Compliance Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.