Prism Microsystems

Displaying 1-6 of 6 results

  • White Papers // Nov 2009

    Security Beyond the Windows Event Log - Monitoring Ten Critical Conditions

    Monitoring the Windows Event Log is critical because the Operating System continuously monitors and logs critical security, system and application events in the Log. Monitoring the Windows Event Log alone, however, is simply not enough because many important conditions in Windows are not stored in the Event Log. The following...

    Provided By Prism Microsystems

  • White Papers // Sep 2009

    Meeting HIPAA Compliance With EventTracker

    There are a number of steps a healthcare provider must undertake to meet the Technical Safeguards mandated in the Security Rules of Title II (Administrative Simplification) of the Health Insurance Portability and Accountability Act (HIPAA). HIPAA calls for tightly controlling and monitoring access to confidential patient information, and specifically calls...

    Provided By Prism Microsystems

  • White Papers // Aug 2009

    Meeting FISMA Compliance With EventTracker: The Importance of Consolidation, Correlation, and Detection Enterprise Security Series

    The Federal Information Security Management Act of 2002 (FISMA) was passed with the purpose of improving computer and network security at government agencies and government contractors. The Act called for increased security standards and yearly audits of the systems and processes, and tasked the National Institute of Standards and Technology...

    Provided By Prism Microsystems

  • White Papers // Aug 2009

    Five Code RED Security Threats to Windows Servers - How to Detect Them

    For a secure corporate network, firewalls and anti-virus software are absolute requirements but they are still not enough to stop all of the critical security threats to network. In addition, while the greater quantity of computer attacks come from the outside, the most serious and costliest to an organization often...

    Provided By Prism Microsystems

  • White Papers // Jun 2009

    Managing the Virtualized Enterprise New Technology, New Challenges

    The benefits of employing virtualization in the corporate data center are compelling - lower operating costs, better resource utilization and increased availability of critical infrastructure to name just a few. It is an apparent "No brainer" which explains why so many organizations are jumping on the bandwagon. Industry analysts estimate...

    Provided By Prism Microsystems

  • White Papers // Apr 2009

    The Top Ten Insider Threats and How to Prevent Them

    With companies making painful personnel and compensation choices in this poor economy, one of the impacts has been an explosion in the number of insider data theft cases. According to a recent KPMG survey, theft by internal users has tripled since 2007 and many believe that the continuing recession will...

    Provided By Prism Microsystems

  • White Papers // Sep 2009

    Meeting HIPAA Compliance With EventTracker

    There are a number of steps a healthcare provider must undertake to meet the Technical Safeguards mandated in the Security Rules of Title II (Administrative Simplification) of the Health Insurance Portability and Accountability Act (HIPAA). HIPAA calls for tightly controlling and monitoring access to confidential patient information, and specifically calls...

    Provided By Prism Microsystems

  • White Papers // Apr 2009

    The Top Ten Insider Threats and How to Prevent Them

    With companies making painful personnel and compensation choices in this poor economy, one of the impacts has been an explosion in the number of insider data theft cases. According to a recent KPMG survey, theft by internal users has tripled since 2007 and many believe that the continuing recession will...

    Provided By Prism Microsystems

  • White Papers // Nov 2009

    Security Beyond the Windows Event Log - Monitoring Ten Critical Conditions

    Monitoring the Windows Event Log is critical because the Operating System continuously monitors and logs critical security, system and application events in the Log. Monitoring the Windows Event Log alone, however, is simply not enough because many important conditions in Windows are not stored in the Event Log. The following...

    Provided By Prism Microsystems

  • White Papers // Aug 2009

    Five Code RED Security Threats to Windows Servers - How to Detect Them

    For a secure corporate network, firewalls and anti-virus software are absolute requirements but they are still not enough to stop all of the critical security threats to network. In addition, while the greater quantity of computer attacks come from the outside, the most serious and costliest to an organization often...

    Provided By Prism Microsystems

  • White Papers // Jun 2009

    Managing the Virtualized Enterprise New Technology, New Challenges

    The benefits of employing virtualization in the corporate data center are compelling - lower operating costs, better resource utilization and increased availability of critical infrastructure to name just a few. It is an apparent "No brainer" which explains why so many organizations are jumping on the bandwagon. Industry analysts estimate...

    Provided By Prism Microsystems

  • White Papers // Aug 2009

    Meeting FISMA Compliance With EventTracker: The Importance of Consolidation, Correlation, and Detection Enterprise Security Series

    The Federal Information Security Management Act of 2002 (FISMA) was passed with the purpose of improving computer and network security at government agencies and government contractors. The Act called for increased security standards and yearly audits of the systems and processes, and tasked the National Institute of Standards and Technology...

    Provided By Prism Microsystems