Search Results for siem

Results 1-5 of 132

In Part I of this two-part blog series, we looked at concerns about loss of control and alternatives to all-or-nothing implementations discussed at our recent webinar, “Fireside Chat: Moving to Office 365 with Security in Mind.” In Part II, we address the question: “Can I trust Microsoft with my security?” Once again, security consultant and […]

In our previous Blog, we covered how customizing SIEM for threat management requires both resources and expertise.  As a result, Intel security created “ready to go” content packs based on Gartner’s Top Use cases.  targeting aspiring users to expand their SIEM detection and response use cases without spending countless hours and resources on tuning. Over […]

Mitigating the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of McAfee security products. Browse the product guidelines available here (click Knowledge Center, and select Product Documentation from the Support Content list) to mitigate the threats based on the behavior described below in the Characteristics and […]

Companies appear to be recognizing the need for increased incident-response spending. Today the SANS Institute released a new incident-response survey that we co-sponsored, with some useful and encouraging findings for practitioners and managers of security operations. There’s quite a bit of good news. At least in part thanks to the increased integration of correlation and […]

The massive amount of log, event and flow data within the SIEM offers security analysts answers to essential security questions such as “who is accessing critical business systems,” or, more importantly, “was there any anomalous activity before, during or after the connection?” To get all these answers, though, users need to filter, correlate, and view […]