Whitepaper

Virtualizing disaster recovery using cloud computing

Almost from the beginning of widespread adoption of computers, organizations realized that disaster recovery was a necessary component of their information technology (IT) plans. Business data had to be backed up, and key processes like order entry, billing, payroll and procurement needed to continue even if an organization’s data center was disabled due to a

Holistic risk management: perspectives from IT professionals

Global organizations are increasingly emphasizing business resilience, that is, the ability to adapt rapidly to a continuously changing business environment. This movement has led to important changes in the roles of IT professionals as they become progressively more engaged in managing all types of risk confronting the organization.

Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized

“Security intelligence” is a term that is commonly used within the information security community, but one that often lacks clarity and definition. Closely aligned with security incident and event management (SIEM), security intelligence is best defined as: “Security intelligence (SI) is the real-time collection, normalization, and analysis of the data generated by users, applications and

Responding to—and recovering from—sophisticated security attacks

Like so many other things in today’s world, cyber attacks— along with those who perpetrate them—are becoming more sophisticated every year. At the same time, IT resources are moving outside the firewall and enterprises are distributing their applications and data across multiple devices. It’s now clear that simply protecting an organization’s perimeter is not enough.

Preventing security risks in real time

As the world becomes more digitized and interconnected, the door to emerging security leaks has opened wider. Today, there are billions of RFID tags for items including products, passports, buildings and animals. With more than two billion Internet users and cellular phone subscriptions now exceeding five billion, nearly one in three people worldwide surfs the

Manage Security and Risk

Compliance and !nancial risk used to be the driving concerns for security and risk management. Audits and governance processes were predictable events that IT attempted to minimize and automate. Risk was a fairly static concept. However, today the pace of threats—“low and slow” as targeted attacks or lightning fast as cyberactivism and malware outbreaks—demands that

Security Management 2.0: Time to Replace Your SIEM?

Is it time? Are you waving the white flag? Has your SIEM failed to meet expectations despite your significant investment? If you are questioning whether your existing product or service can get the job done, you are not alone. You likely have some battle scars from the difficulty of managing, scaling, and actually doing something

De kip of het ei?

Dit rapport bevat de belangrijkste uitkomsten van de benchmark over de productiviteit van IT afdelingen. Het onderzoek is afgenomen bij organisaties in diverse sectoren, onder meer in de zorg, het onderwijs, de lokale en provinciale overheid, IT, retail, zakelijke dienstverlening en industrie. Het merendeel van de respondenten heeft meer dan 750 werkplekken. Het onderzoek is

The Big Security Data Challenge – Make SIEM work for you

Big Data is not only a challenge for customer-facing organizations—but for security teams as well. Over the past decade, the demand for stronger security has driven the collection and analysis of increasingly larger amounts of event and security contextual data. Security Information and Event Management (SIEM) has long been the core tool that security teams

Focus On Five – Siem Requirements

SIEM: Solve for the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered mature. Capabilities such as event collection, correlation, alerting, and demonstrating compliance with regulatory mandates are table stakes, and most SIEM solutions address these needs. But the landscape is changing.