Prism Microsystems

Displaying 1-14 of 14 results

  • White Papers // Nov 2009

    Security Beyond the Windows Event Log - Monitoring Ten Critical Conditions

    Monitoring the Windows Event Log is critical because the Operating System continuously monitors and logs critical security, system and application events in the Log. Monitoring the Windows Event Log alone, however, is simply not enough because many important conditions in Windows are not stored in the Event Log. The following...

    Provided By Prism Microsystems

  • White Papers // Sep 2009

    Meeting HIPAA Compliance With EventTracker

    There are a number of steps a healthcare provider must undertake to meet the Technical Safeguards mandated in the Security Rules of Title II (Administrative Simplification) of the Health Insurance Portability and Accountability Act (HIPAA). HIPAA calls for tightly controlling and monitoring access to confidential patient information, and specifically calls...

    Provided By Prism Microsystems

  • White Papers // Aug 2009

    Meeting FISMA Compliance With EventTracker: The Importance of Consolidation, Correlation, and Detection Enterprise Security Series

    The Federal Information Security Management Act of 2002 (FISMA) was passed with the purpose of improving computer and network security at government agencies and government contractors. The Act called for increased security standards and yearly audits of the systems and processes, and tasked the National Institute of Standards and Technology...

    Provided By Prism Microsystems

  • White Papers // Aug 2009

    Five Code RED Security Threats to Windows Servers - How to Detect Them

    For a secure corporate network, firewalls and anti-virus software are absolute requirements but they are still not enough to stop all of the critical security threats to network. In addition, while the greater quantity of computer attacks come from the outside, the most serious and costliest to an organization often...

    Provided By Prism Microsystems

  • White Papers // Jun 2009

    Managing the Virtualized Enterprise New Technology, New Challenges

    The benefits of employing virtualization in the corporate data center are compelling - lower operating costs, better resource utilization and increased availability of critical infrastructure to name just a few. It is an apparent "No brainer" which explains why so many organizations are jumping on the bandwagon. Industry analysts estimate...

    Provided By Prism Microsystems

  • White Papers // Apr 2009

    The Top Ten Insider Threats and How to Prevent Them

    With companies making painful personnel and compensation choices in this poor economy, one of the impacts has been an explosion in the number of insider data theft cases. According to a recent KPMG survey, theft by internal users has tripled since 2007 and many believe that the continuing recession will...

    Provided By Prism Microsystems

  • Webcasts // Jan 2009

    Using Log Management to Secure Your IT Infrastructure

    IT security professional is responsible for the secure running of the company's IT infrastructure. But how to figure out what is most important against what seems to be a never ending list of competing issues? The presenter will throw light on the compelling case for why log management should be...

    Provided By Prism Microsystems

  • Webcasts // Jan 2009

    Top Ten Best Practices to Stop Insider Threats

    Insider theft and other malicious behavior are particularly difficult because employees often have legitimate access to sensitive corporate data and tend to know the weaknesses in the organization's infrastructure. Over the course of hundreds of customer interactions, Prism Microsystems, a leading security vendor, has developed best practices for monitoring potential...

    Provided By Prism Microsystems

  • Webcasts // Jan 2009

    Detecting a Hacking Attempt

    In today's technological environment, threat profiles are evolving constantly and growing in sophistication and the impact of successful attacks is far more severe in terms of lost revenue and negative publicity. Relying on reactive anti-virus and rule-based firewall systems alone are often insufficient to prevent damage. It is critical to...

    Provided By Prism Microsystems

  • Webcasts // Jan 2009

    Are You Monitoring the Top Ten Critical Security, System, and User Events

    Monitoring the Microsoft Windows Event Log is critical because the Operating System and key applications continuously record critical security, system and user events in the Log. However, monitoring the Windows Event Log alone is not enough because many important conditions in Windows are not recorded in the Event Log. The...

    Provided By Prism Microsystems

  • Webcasts // Jan 2009

    Beyond Traditional Security: Blending Proactive and Reactive Security to Protect the Enterprise.

    Traditional firewalls and Intrusion Detection Systems leave the organization unprotected from most zero-day and internal attacks. One need a combination of both event and change management practices to protect the organization. The presenter will discuss how to use a combination of proactive and reactive security strategies to shield the organization...

    Provided By Prism Microsystems

  • Webcasts // Jan 2009

    Using Behavior-Based Correlation to Detect Threats in Real Time

    The EventCorrelator is an important and powerful tool in the hands of the system administrator and is crucial for maximizing the value of event log management and analysis. Often the clues to an ongoing attack are scattered across multiple systems and devices and it becomes nearly impossible to detect these...

    Provided By Prism Microsystems

  • Webcasts // Jan 2009

    Improve Data Security and Meet the PCI-DSS Compliance Requirement

    This webcast discusses the PCI-DSS compliance requirements, how to improve the data security, and how EventTracker can help to maintain confident compliance.

    Provided By Prism Microsystems

  • Webcasts // Jan 2009

    Maximize Your Log Data - The Top 30 Reports for Compliance, Security & Performance

    How to create actionable information out of mountains of logs? The attendee of this webcast will learn how to create the top reports to meet Compliance needs, monitor the security and manage the performance. The webcast will also discuss the basics of log data collection and the EventTracker report generation...

    Provided By Prism Microsystems

  • Webcasts // Jan 2009

    Using Log Management to Secure Your IT Infrastructure

    IT security professional is responsible for the secure running of the company's IT infrastructure. But how to figure out what is most important against what seems to be a never ending list of competing issues? The presenter will throw light on the compelling case for why log management should be...

    Provided By Prism Microsystems

  • Webcasts // Jan 2009

    Top Ten Best Practices to Stop Insider Threats

    Insider theft and other malicious behavior are particularly difficult because employees often have legitimate access to sensitive corporate data and tend to know the weaknesses in the organization's infrastructure. Over the course of hundreds of customer interactions, Prism Microsystems, a leading security vendor, has developed best practices for monitoring potential...

    Provided By Prism Microsystems

  • Webcasts // Jan 2009

    Detecting a Hacking Attempt

    In today's technological environment, threat profiles are evolving constantly and growing in sophistication and the impact of successful attacks is far more severe in terms of lost revenue and negative publicity. Relying on reactive anti-virus and rule-based firewall systems alone are often insufficient to prevent damage. It is critical to...

    Provided By Prism Microsystems

  • Webcasts // Jan 2009

    Are You Monitoring the Top Ten Critical Security, System, and User Events

    Monitoring the Microsoft Windows Event Log is critical because the Operating System and key applications continuously record critical security, system and user events in the Log. However, monitoring the Windows Event Log alone is not enough because many important conditions in Windows are not recorded in the Event Log. The...

    Provided By Prism Microsystems

  • Webcasts // Jan 2009

    Beyond Traditional Security: Blending Proactive and Reactive Security to Protect the Enterprise.

    Traditional firewalls and Intrusion Detection Systems leave the organization unprotected from most zero-day and internal attacks. One need a combination of both event and change management practices to protect the organization. The presenter will discuss how to use a combination of proactive and reactive security strategies to shield the organization...

    Provided By Prism Microsystems

  • Webcasts // Jan 2009

    Using Behavior-Based Correlation to Detect Threats in Real Time

    The EventCorrelator is an important and powerful tool in the hands of the system administrator and is crucial for maximizing the value of event log management and analysis. Often the clues to an ongoing attack are scattered across multiple systems and devices and it becomes nearly impossible to detect these...

    Provided By Prism Microsystems

  • Webcasts // Jan 2009

    Improve Data Security and Meet the PCI-DSS Compliance Requirement

    This webcast discusses the PCI-DSS compliance requirements, how to improve the data security, and how EventTracker can help to maintain confident compliance.

    Provided By Prism Microsystems

  • Webcasts // Jan 2009

    Maximize Your Log Data - The Top 30 Reports for Compliance, Security & Performance

    How to create actionable information out of mountains of logs? The attendee of this webcast will learn how to create the top reports to meet Compliance needs, monitor the security and manage the performance. The webcast will also discuss the basics of log data collection and the EventTracker report generation...

    Provided By Prism Microsystems

  • White Papers // Aug 2009

    Meeting FISMA Compliance With EventTracker: The Importance of Consolidation, Correlation, and Detection Enterprise Security Series

    The Federal Information Security Management Act of 2002 (FISMA) was passed with the purpose of improving computer and network security at government agencies and government contractors. The Act called for increased security standards and yearly audits of the systems and processes, and tasked the National Institute of Standards and Technology...

    Provided By Prism Microsystems

  • White Papers // Sep 2009

    Meeting HIPAA Compliance With EventTracker

    There are a number of steps a healthcare provider must undertake to meet the Technical Safeguards mandated in the Security Rules of Title II (Administrative Simplification) of the Health Insurance Portability and Accountability Act (HIPAA). HIPAA calls for tightly controlling and monitoring access to confidential patient information, and specifically calls...

    Provided By Prism Microsystems

  • White Papers // Apr 2009

    The Top Ten Insider Threats and How to Prevent Them

    With companies making painful personnel and compensation choices in this poor economy, one of the impacts has been an explosion in the number of insider data theft cases. According to a recent KPMG survey, theft by internal users has tripled since 2007 and many believe that the continuing recession will...

    Provided By Prism Microsystems

  • White Papers // Nov 2009

    Security Beyond the Windows Event Log - Monitoring Ten Critical Conditions

    Monitoring the Windows Event Log is critical because the Operating System continuously monitors and logs critical security, system and application events in the Log. Monitoring the Windows Event Log alone, however, is simply not enough because many important conditions in Windows are not stored in the Event Log. The following...

    Provided By Prism Microsystems

  • White Papers // Aug 2009

    Five Code RED Security Threats to Windows Servers - How to Detect Them

    For a secure corporate network, firewalls and anti-virus software are absolute requirements but they are still not enough to stop all of the critical security threats to network. In addition, while the greater quantity of computer attacks come from the outside, the most serious and costliest to an organization often...

    Provided By Prism Microsystems

  • White Papers // Jun 2009

    Managing the Virtualized Enterprise New Technology, New Challenges

    The benefits of employing virtualization in the corporate data center are compelling - lower operating costs, better resource utilization and increased availability of critical infrastructure to name just a few. It is an apparent "No brainer" which explains why so many organizations are jumping on the bandwagon. Industry analysts estimate...

    Provided By Prism Microsystems