NitroSecurity

Displaying 1-35 of 35 results

  • Webcasts // Nov 2011

    Critical Control System Vulnerabilities Demonstrated - And What to Do About Them

    Control systems are embedded in most industries to automate the production, delivery and safe storage of the food and drinks the people consume, the transportation people take, the chemicals people process, and the energy people utilize. These systems, some of which are being connected directly to the Internet, are increasingly...

    Provided By NitroSecurity

  • Webcasts // Oct 2011

    Monitoring and Securing SCADA Networks

    SCADA networks are just different. Compared to enterprise IT networks, they have different security objectives, most of the endpoint actors are machines rather than people, their incidents can have immediate physical consequences, and they are more likely to be targeted by hostile actors such as terrorists. Moreover, SCADA networks must...

    Provided By NitroSecurity

  • Webcasts // Sep 2011

    Security Management 2.0: Time to Replace Your SIEM?

    In this webcast, the presenters say about the reality is that many organizations have spent millions and years trying to get productivity out of their SIEM - with mediocre results. Most security teams need to start asking themselves some key questions: Is it time? Any one waving the white flag?...

    Provided By NitroSecurity

  • Webcasts // Jul 2011

    Actionable Intelligence From Advanced SIEM Systems

    In this webcast, the presenters say about to make better, faster security decisions for one organization, one need better information faster. Capturing the existing network event, log and flow data already provided by one infrastructure with a Security Information and Event Monitoring (SIEM) solution is the first key step to...

    Provided By NitroSecurity

  • Webcasts // May 2011

    Detecting Advanced Threats With New Risk Score Correlation and SIEM

    In this webcast, the presenters say sophisticated malware and determined insiders present dual challenges for IT security teams. Insiders understand internal policies and operate "Within the rules," while advanced malware's persistence and stealth can evade most detection technologies.

    Provided By NitroSecurity

  • Webcasts // Apr 2011

    Securing ePHI With Effective Database Activity Monitoring

    In this webcast, the presenters say about electronic patient health information can be widely distributed throughout multiple databases within a provider's IT infrastructure. Monitoring and logging all database activity to ensure that sensitive data is being accessed appropriately, and by the right people, is critical to preventing costly and embarrassing...

    Provided By NitroSecurity

  • Webcasts // Apr 2011

    Detecting Advanced Threats and Malware With SIEM

    In this webcast, the presenters say about many organizations have deployed Security Information and Event Management (SIEM) solution to meet regulatory compliance requirements, high performance SIEM solutions can do much more. By correlating events, logs, and network flows SIEMs can uncover a range of diverse "Low and slow" attacks.

    Provided By NitroSecurity

  • Webcasts // Mar 2011

    3 Key Factors Driving Effective ePHI Monitoring

    In this webcast, the presenters say about monitoring and auditing healthcare provider systems that store, manipulate or transmit electronic patient health information is becoming significantly more important. The interim Breach Notification Rule that came out in late 2009 increased the need to be able to accurately identify who had accessed...

    Provided By NitroSecurity

  • Webcasts // Mar 2011

    SC eConference: PCI Compliance That Makes Systems Secure

    In this webcast, the presenters say about the many demands noted in the PCI Data Security Standard is no small feat, as many information security pros well know. And while there are many who claim they're in line with these industry regulations, they find themselves still getting victimized by cybercriminals....

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    The Trusted Insider Threat - Lessons Learned From WikiLeaks

    In this webcast, the presenters say about protecting against and detecting potential data leakage is at the heart of the WikiLeaks controversy. However there is no "One size fits all" solution. It must be addressed at multiple levels with collaborating technologies, including SIEM, database monitoring and application monitoring, to provide...

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    The Emergence of Content Aware SIEM

    In this webcast, the presenters say about content aware SIEM is a new generation of Security Information and Event Management (SIEM) solutions that now have visibility into network flows, database sessions and application layer data and can combat insider threats, data loss, fraud and advanced persistent threats.

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Detecting Dangerous PDFs and Application Layer Threats

    In this webcast, the presenters say about malware making use of PDF files is one of many complex threats that are "Moving up the stack" to exploit vulnerabilities at the application and session layers. Visibility into the contents of applications, documents and protocols is needed to capture critical data to...

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Automating Compliance and Security With SIEM at the Bank of China

    In this webcast, the presenters speak about increasing compliance requirements and relentless cyber threats and attacks, the Bank of China in New York needed to automate network security to make its IT staff more effective and efficient.

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Making Log Data Actionable Through SIEM Integration

    In this webcast, the presenters say about log data collected to meet compliance requirements can be used to increase security as well. If effectively combined with event, activity and flow data, logs contribute to effective threat detection and incident response. A deeply integrated, high performance SIEM and log management solution...

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Database Monitoring & SIEM - Beyond Compliance to Data Breach and Fraud Detection

    In this webcast, the presenters say about the database activity monitoring is a key requirement of many compliance mandates - monitoring and logging all database activity to ensure that sensitive data is being access appropriately, and by the right people. But when DAM and SIEM are integrated, the combination provides...

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Tool Talk Webcast: Moving Past the Hype: SIEM Best Practices for Daily Security Operations

    In this webcast, the presenters say about all heard the claims, but can one really use a SIEM to detect and respond to real time threats? What are the indications that an advanced attack or insider breach is underway, or about to occur? Learn both best practices and pitfalls to...

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Situational Awareness in Industrial Networks an Early Warning System for Energy, Chemical, Nuclear and Other Industrial Systems

    In this webcast, the presenters say about network behavior and security events can be measured and analyzed to indicate errors, anomalies and threats to their information infrastructure. Industrial processes can also be measured analyzed for availability, performance and quality.

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Proactive Compliance for PCI-DSS 2.0

    In this webcast, the presenters say about current compliance methods are reactive and do little to improve security. In place of annual audits and document-heavy processes, a new, Proactive Compliance model makes compliance an element of normal information security operations.

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Tool Talk Webcast: Detect Data Loss and Fraud With Application Monitoring and SIEM

    In this webcast, the presenters say about sensitive information is leaving organizations inside email attachments, file transfers, instant messages, and social media and web posts. Confidential data is being altered - whether by a disgruntled employee, or by an outsider using compromised user credentials. Current technologies, like DLP, can be...

    Provided By NitroSecurity

  • Webcasts // Nov 2010

    Why SIEM Should Be on Your 2011 Short List

    In this webcast, the presenters say about information security is in a rapid state of change. The threat landscape grows more pervasive and sophisticated each day with new attacks targeting applications, zero-day vulnerabilities, and even industrial control systems. At the same time, IT infrastructure is also in the midst of...

    Provided By NitroSecurity

  • Webcasts // Oct 2010

    Detecting Data Leakage and Cyber Threats to PHI With Security Information Management

    In this webcast, the presenters say about healthcare entities address increasing compliance requirements and implement electronic health record systems, the relentless risk of data leakage and cyber threats becomes even more challenging. Protected Health Information (PHI) is vulnerable to both insider actions and outsider threats.

    Provided By NitroSecurity

  • Webcasts // Oct 2010

    Building a Better Bunker: Securing Energy Control Systems Against Terrorists and Cyberwarriors

    In this webcast, the presenters say about power is the basis for almost every critical service known to society. Yet, as energy providers move to more open, public-facing Smart Grid technologies, the integrated fabric of their most critical infrastructure is already falling under attack.

    Provided By NitroSecurity

  • Webcasts // Sep 2010

    Keys to Selecting SIEM & Log Management

    In this webcast, the presenters say about today's securing networks and meeting compliance requirements are dual challenges faced by every IT team. Bad things are happening much faster, as new exploits are discovered, 'Weaponized', and distributed to the world within hours.

    Provided By NitroSecurity

  • Webcasts // Apr 2010

    Automating Security & Compliance With SIEM at Dallas-Fort Worth Hospital Council

    In this webcast, the presenters say about relentless cyber-threats and increasing compliance requirements can overwhelm the existing processes used by hospital IT staffs. New Security Information and Event Management (SIEM) solutions automate threat detection, enable rapid incident response and simplify compliance reporting.

    Provided By NitroSecurity

  • Webcasts // Mar 2010

    State Privacy Laws, National Reach How to Avoid Becoming a Case Study for Non-Compliance

    In this webcast, the presenters say about more adoption of privacy laws to protect their residents' personal information, the scope of these laws is evolving in significant ways. No longer just data breach notification requirements, today's laws mandate that companies take preventative measures to secure sensitive data.

    Provided By NitroSecurity

  • White Papers // Oct 2009

    Control System Security: Threat Detection and Management in the Critical Infrastructure

    This whitepaper discusses how to implement a combination of Deep Packet Inspection (Intrusion Prevention and/or Application and Protocol Monitoring), Database Activity Monitoring, and Security Information & Event Management systems (SIEM) to secure the critical infrastructure. NitroSecurity's NitroView Enterprise Security Manager combines the necessary functions of SIEM, IPS, Database Monitoring, and...

    Provided By NitroSecurity

  • White Papers // Jul 2009

    A Comparative Analysis of DAM Vs. Native Database Auditing Vs. Database Log Analysis With a SIEM or Log Manager

    It does make a lot of sense to use a DAM with a SIM so one has the holistic picture of database events in tandem with other security events such as the OS, application logs, IDS's and firewalls. One can benefit from other features a SIM provides such as advanced...

    Provided By NitroSecurity

  • White Papers // May 2009

    Securing Critical Infrastructures Through Security Information Management

    Several of the critical infrastructure sectors have issued standards or guidelines for configuring and managing the security of Industrial Automation and Control Systems. These include the energy sector, which has issued the Critical Infrastructure Protection (CIP) standards through the North American Electric Corporation (NERC). These standards are referred to as...

    Provided By NitroSecurity

  • White Papers // Apr 2009

    What FIPS and Common Criteria Certifications Mean to SIEM: Understanding the Relevance of Security Standards in the Context of a Security Information Management Systems

    By definition, Security Information & Event Management systems (SIEMs) are used for the collection of events and logs pertaining to sensitive or protected information. A SIEM attempts to collect as much information as possible to determine security threats, and to help mitigate and remediate those threats by making as much...

    Provided By NitroSecurity

  • White Papers // Apr 2009

    Securing EMR (Electronic Medical Records)

    Information Technology advancements in healthcare are expected to accelerate, due to cost concerns, more viable and cost-effective Electronic Medical Record (EMR) technology, and federal spending initiatives. With an increase in healthcare IT comes a corresponding concern over healthcare information security. EMR (also referred to as electronic healthcare records or EHR)...

    Provided By NitroSecurity

  • White Papers // Mar 2009

    Content Aware SIEM Defined

    Content Aware SIEM (CA-SIEM) represents a new generation of Security Information and Event Management (SIEM) capabilities that extend the value and benefits of SIEM by providing visibility into the contents of applications, documents and protocols. Without content awareness, a SIEM is only able to act upon the surface details provided...

    Provided By NitroSecurity

  • White Papers // Mar 2009

    The NitroGuard IPS Engine, From the Creators of In-Line SNORT (IPS)

    NitroSecurity has been developing innovations in intrusion detection and prevention, and security data management, since 2000, investing approximately 100 man-years of research and development into IPS technology - including the creation of the first Snort-based IPS, Snort-inline. Snort-inline, which was incorporated into SNORT in v2.2, was further enhanced by NitroSecurity,...

    Provided By NitroSecurity

  • White Papers // Jan 2009

    Meeting PCI: How to Use Information Security Tools to Meet the 12 Requirements of PCI-DSS

    There are many commercially available information security tools on the market, many of which can help with PCI compliance. At a minimum, PCI-DSS requires a firewall and Intrusion Prevention System (IPS). Note that most modern IPS devices will provide firewall functionality as well, a Database Monitoring system (DAM, or DBM)...

    Provided By NitroSecurity

  • White Papers // Jan 2009

    The Cost of Non-Compliance

    Low Risk, Robust Reporting. Implementing NitroView LogCaster and NitroView DBM is low risk and it makes reporting simple. Because they are not co-hosted on the database platform and monitoring takes place on the network, LogCaster and NitroView DBM do not interact with or impact the database. Further, because LogCaster and...

    Provided By NitroSecurity

  • White Papers // Jan 2009

    Integrated Security Provides Necessary Efficiency to Survive Economic Hardships

    The economy isn't doing so well. Everyone is feeling the effects of shrinking budgets and increased economic pressure. At the same time, the rate of cyber crimes is increasing. Regulations surrounding information security are becoming stricter and more strongly enforced. The costs associated with data loss - especially when Personal...

    Provided By NitroSecurity

  • White Papers // Jul 2009

    A Comparative Analysis of DAM Vs. Native Database Auditing Vs. Database Log Analysis With a SIEM or Log Manager

    It does make a lot of sense to use a DAM with a SIM so one has the holistic picture of database events in tandem with other security events such as the OS, application logs, IDS's and firewalls. One can benefit from other features a SIM provides such as advanced...

    Provided By NitroSecurity

  • White Papers // May 2009

    Securing Critical Infrastructures Through Security Information Management

    Several of the critical infrastructure sectors have issued standards or guidelines for configuring and managing the security of Industrial Automation and Control Systems. These include the energy sector, which has issued the Critical Infrastructure Protection (CIP) standards through the North American Electric Corporation (NERC). These standards are referred to as...

    Provided By NitroSecurity

  • White Papers // Apr 2009

    What FIPS and Common Criteria Certifications Mean to SIEM: Understanding the Relevance of Security Standards in the Context of a Security Information Management Systems

    By definition, Security Information & Event Management systems (SIEMs) are used for the collection of events and logs pertaining to sensitive or protected information. A SIEM attempts to collect as much information as possible to determine security threats, and to help mitigate and remediate those threats by making as much...

    Provided By NitroSecurity

  • White Papers // Apr 2009

    Securing EMR (Electronic Medical Records)

    Information Technology advancements in healthcare are expected to accelerate, due to cost concerns, more viable and cost-effective Electronic Medical Record (EMR) technology, and federal spending initiatives. With an increase in healthcare IT comes a corresponding concern over healthcare information security. EMR (also referred to as electronic healthcare records or EHR)...

    Provided By NitroSecurity

  • White Papers // Jan 2009

    The Cost of Non-Compliance

    Low Risk, Robust Reporting. Implementing NitroView LogCaster and NitroView DBM is low risk and it makes reporting simple. Because they are not co-hosted on the database platform and monitoring takes place on the network, LogCaster and NitroView DBM do not interact with or impact the database. Further, because LogCaster and...

    Provided By NitroSecurity

  • Webcasts // Oct 2010

    Building a Better Bunker: Securing Energy Control Systems Against Terrorists and Cyberwarriors

    In this webcast, the presenters say about power is the basis for almost every critical service known to society. Yet, as energy providers move to more open, public-facing Smart Grid technologies, the integrated fabric of their most critical infrastructure is already falling under attack.

    Provided By NitroSecurity

  • Webcasts // Sep 2010

    Keys to Selecting SIEM & Log Management

    In this webcast, the presenters say about today's securing networks and meeting compliance requirements are dual challenges faced by every IT team. Bad things are happening much faster, as new exploits are discovered, 'Weaponized', and distributed to the world within hours.

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    The Emergence of Content Aware SIEM

    In this webcast, the presenters say about content aware SIEM is a new generation of Security Information and Event Management (SIEM) solutions that now have visibility into network flows, database sessions and application layer data and can combat insider threats, data loss, fraud and advanced persistent threats.

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Detecting Dangerous PDFs and Application Layer Threats

    In this webcast, the presenters say about malware making use of PDF files is one of many complex threats that are "Moving up the stack" to exploit vulnerabilities at the application and session layers. Visibility into the contents of applications, documents and protocols is needed to capture critical data to...

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Automating Compliance and Security With SIEM at the Bank of China

    In this webcast, the presenters speak about increasing compliance requirements and relentless cyber threats and attacks, the Bank of China in New York needed to automate network security to make its IT staff more effective and efficient.

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Making Log Data Actionable Through SIEM Integration

    In this webcast, the presenters say about log data collected to meet compliance requirements can be used to increase security as well. If effectively combined with event, activity and flow data, logs contribute to effective threat detection and incident response. A deeply integrated, high performance SIEM and log management solution...

    Provided By NitroSecurity

  • Webcasts // Apr 2010

    Automating Security & Compliance With SIEM at Dallas-Fort Worth Hospital Council

    In this webcast, the presenters say about relentless cyber-threats and increasing compliance requirements can overwhelm the existing processes used by hospital IT staffs. New Security Information and Event Management (SIEM) solutions automate threat detection, enable rapid incident response and simplify compliance reporting.

    Provided By NitroSecurity

  • Webcasts // Mar 2010

    State Privacy Laws, National Reach How to Avoid Becoming a Case Study for Non-Compliance

    In this webcast, the presenters say about more adoption of privacy laws to protect their residents' personal information, the scope of these laws is evolving in significant ways. No longer just data breach notification requirements, today's laws mandate that companies take preventative measures to secure sensitive data.

    Provided By NitroSecurity

  • Webcasts // Nov 2011

    Critical Control System Vulnerabilities Demonstrated - And What to Do About Them

    Control systems are embedded in most industries to automate the production, delivery and safe storage of the food and drinks the people consume, the transportation people take, the chemicals people process, and the energy people utilize. These systems, some of which are being connected directly to the Internet, are increasingly...

    Provided By NitroSecurity

  • Webcasts // Oct 2011

    Monitoring and Securing SCADA Networks

    SCADA networks are just different. Compared to enterprise IT networks, they have different security objectives, most of the endpoint actors are machines rather than people, their incidents can have immediate physical consequences, and they are more likely to be targeted by hostile actors such as terrorists. Moreover, SCADA networks must...

    Provided By NitroSecurity

  • White Papers // Jan 2009

    Integrated Security Provides Necessary Efficiency to Survive Economic Hardships

    The economy isn't doing so well. Everyone is feeling the effects of shrinking budgets and increased economic pressure. At the same time, the rate of cyber crimes is increasing. Regulations surrounding information security are becoming stricter and more strongly enforced. The costs associated with data loss - especially when Personal...

    Provided By NitroSecurity

  • White Papers // Jan 2009

    Meeting PCI: How to Use Information Security Tools to Meet the 12 Requirements of PCI-DSS

    There are many commercially available information security tools on the market, many of which can help with PCI compliance. At a minimum, PCI-DSS requires a firewall and Intrusion Prevention System (IPS). Note that most modern IPS devices will provide firewall functionality as well, a Database Monitoring system (DAM, or DBM)...

    Provided By NitroSecurity

  • White Papers // Mar 2009

    The NitroGuard IPS Engine, From the Creators of In-Line SNORT (IPS)

    NitroSecurity has been developing innovations in intrusion detection and prevention, and security data management, since 2000, investing approximately 100 man-years of research and development into IPS technology - including the creation of the first Snort-based IPS, Snort-inline. Snort-inline, which was incorporated into SNORT in v2.2, was further enhanced by NitroSecurity,...

    Provided By NitroSecurity

  • White Papers // Mar 2009

    Content Aware SIEM Defined

    Content Aware SIEM (CA-SIEM) represents a new generation of Security Information and Event Management (SIEM) capabilities that extend the value and benefits of SIEM by providing visibility into the contents of applications, documents and protocols. Without content awareness, a SIEM is only able to act upon the surface details provided...

    Provided By NitroSecurity

  • White Papers // Oct 2009

    Control System Security: Threat Detection and Management in the Critical Infrastructure

    This whitepaper discusses how to implement a combination of Deep Packet Inspection (Intrusion Prevention and/or Application and Protocol Monitoring), Database Activity Monitoring, and Security Information & Event Management systems (SIEM) to secure the critical infrastructure. NitroSecurity's NitroView Enterprise Security Manager combines the necessary functions of SIEM, IPS, Database Monitoring, and...

    Provided By NitroSecurity

  • Webcasts // Sep 2011

    Security Management 2.0: Time to Replace Your SIEM?

    In this webcast, the presenters say about the reality is that many organizations have spent millions and years trying to get productivity out of their SIEM - with mediocre results. Most security teams need to start asking themselves some key questions: Is it time? Any one waving the white flag?...

    Provided By NitroSecurity

  • Webcasts // Jul 2011

    Actionable Intelligence From Advanced SIEM Systems

    In this webcast, the presenters say about to make better, faster security decisions for one organization, one need better information faster. Capturing the existing network event, log and flow data already provided by one infrastructure with a Security Information and Event Monitoring (SIEM) solution is the first key step to...

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Database Monitoring & SIEM - Beyond Compliance to Data Breach and Fraud Detection

    In this webcast, the presenters say about the database activity monitoring is a key requirement of many compliance mandates - monitoring and logging all database activity to ensure that sensitive data is being access appropriately, and by the right people. But when DAM and SIEM are integrated, the combination provides...

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Tool Talk Webcast: Moving Past the Hype: SIEM Best Practices for Daily Security Operations

    In this webcast, the presenters say about all heard the claims, but can one really use a SIEM to detect and respond to real time threats? What are the indications that an advanced attack or insider breach is underway, or about to occur? Learn both best practices and pitfalls to...

    Provided By NitroSecurity

  • Webcasts // May 2011

    Detecting Advanced Threats With New Risk Score Correlation and SIEM

    In this webcast, the presenters say sophisticated malware and determined insiders present dual challenges for IT security teams. Insiders understand internal policies and operate "Within the rules," while advanced malware's persistence and stealth can evade most detection technologies.

    Provided By NitroSecurity

  • Webcasts // Apr 2011

    Securing ePHI With Effective Database Activity Monitoring

    In this webcast, the presenters say about electronic patient health information can be widely distributed throughout multiple databases within a provider's IT infrastructure. Monitoring and logging all database activity to ensure that sensitive data is being accessed appropriately, and by the right people, is critical to preventing costly and embarrassing...

    Provided By NitroSecurity

  • Webcasts // Apr 2011

    Detecting Advanced Threats and Malware With SIEM

    In this webcast, the presenters say about many organizations have deployed Security Information and Event Management (SIEM) solution to meet regulatory compliance requirements, high performance SIEM solutions can do much more. By correlating events, logs, and network flows SIEMs can uncover a range of diverse "Low and slow" attacks.

    Provided By NitroSecurity

  • Webcasts // Mar 2011

    3 Key Factors Driving Effective ePHI Monitoring

    In this webcast, the presenters say about monitoring and auditing healthcare provider systems that store, manipulate or transmit electronic patient health information is becoming significantly more important. The interim Breach Notification Rule that came out in late 2009 increased the need to be able to accurately identify who had accessed...

    Provided By NitroSecurity

  • Webcasts // Mar 2011

    SC eConference: PCI Compliance That Makes Systems Secure

    In this webcast, the presenters say about the many demands noted in the PCI Data Security Standard is no small feat, as many information security pros well know. And while there are many who claim they're in line with these industry regulations, they find themselves still getting victimized by cybercriminals....

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Situational Awareness in Industrial Networks an Early Warning System for Energy, Chemical, Nuclear and Other Industrial Systems

    In this webcast, the presenters say about network behavior and security events can be measured and analyzed to indicate errors, anomalies and threats to their information infrastructure. Industrial processes can also be measured analyzed for availability, performance and quality.

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Proactive Compliance for PCI-DSS 2.0

    In this webcast, the presenters say about current compliance methods are reactive and do little to improve security. In place of annual audits and document-heavy processes, a new, Proactive Compliance model makes compliance an element of normal information security operations.

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    The Trusted Insider Threat - Lessons Learned From WikiLeaks

    In this webcast, the presenters say about protecting against and detecting potential data leakage is at the heart of the WikiLeaks controversy. However there is no "One size fits all" solution. It must be addressed at multiple levels with collaborating technologies, including SIEM, database monitoring and application monitoring, to provide...

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Tool Talk Webcast: Detect Data Loss and Fraud With Application Monitoring and SIEM

    In this webcast, the presenters say about sensitive information is leaving organizations inside email attachments, file transfers, instant messages, and social media and web posts. Confidential data is being altered - whether by a disgruntled employee, or by an outsider using compromised user credentials. Current technologies, like DLP, can be...

    Provided By NitroSecurity

  • Webcasts // Nov 2010

    Why SIEM Should Be on Your 2011 Short List

    In this webcast, the presenters say about information security is in a rapid state of change. The threat landscape grows more pervasive and sophisticated each day with new attacks targeting applications, zero-day vulnerabilities, and even industrial control systems. At the same time, IT infrastructure is also in the midst of...

    Provided By NitroSecurity

  • Webcasts // Oct 2010

    Detecting Data Leakage and Cyber Threats to PHI With Security Information Management

    In this webcast, the presenters say about healthcare entities address increasing compliance requirements and implement electronic health record systems, the relentless risk of data leakage and cyber threats becomes even more challenging. Protected Health Information (PHI) is vulnerable to both insider actions and outsider threats.

    Provided By NitroSecurity