×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Siem - Security Information And Event Managers
     

Siem - Security Information And Event Managers

by Kevin Roebuck
 
A security event manager (SEM) (acronyms SIEM and SIM) is a computerized tool used on enterprise data networks to centralize the storage and interpretation of logs, or events, generated by other software running on the network.
SEMs are a relatively new idea, pioneered in 1999 by a small company called e-Security, and in 2010 are still evolving rapidly. Just a year

Overview

A security event manager (SEM) (acronyms SIEM and SIM) is a computerized tool used on enterprise data networks to centralize the storage and interpretation of logs, or events, generated by other software running on the network.
SEMs are a relatively new idea, pioneered in 1999 by a small company called e-Security, and in 2010 are still evolving rapidly. Just a year or two ago they were called security information managers (SIMs) and are also called security information and event managers (SIEMs). An adjacent, but somewhat different market also exists for Log Management; although these two fields are closely related, Log Management typically focuses on collection and storage of data whereas SEM focuses on data analysis. Some vendors specialize in one market or the other and some do both, or have complementary products.

This book is your ultimate resource for SIEM - Security Information and Event Managers. Here you will find the most up-to-date information, analysis, background and everything you need to know.

In easy to read chapters, with extensive references and links to get you to know all there is to know about SIEM - Security Information and Event Managers right away, covering: Security event manager, Computer security, 2009 Sidekick data loss, AAFID, Absolute Manage, Accelops, Acceptable use policy, Access token, Advanced Persistent Threat, Air gap (networking), Ambient authority, Anomaly-based intrusion detection system, Application firewall, Application security, Asset (computer security), Attack (computer), AutoRun, Blacklist (computing), Blue Cube Security, BlueHat, Centurion guard, Client honeypot, Cloud computing security, Collaboration-oriented architecture, Committee on National Security Systems, Computer Law and Security Report, Computer security compromised by hardware failure, Computer security incident management, Computer security model, Computer surveillance, Confused deputy problem, Consensus audit guidelines, Countermeasure (computer), CPU modes, Cracking of wireless networks, Crackme, Cross-site printing, CryptoRights Foundation, CVSS, Control system security, Cyber security standards, Cyber spying, Cyber Storm Exercise, Cyber Storm II, Cyberconfidence, Cyberheist, Dancing pigs, Data breach, Data loss prevention software, Data validation, Digital self-defense, Dolev-Yao model, DREAD: Risk assessment model, Dynamic SSL, Economics of security, Enterprise information security architecture, Entrust, Evasion (network security), Event data, Event Management Processes, as defined by IT IL, Federal Desktop Core Configuration, Federal Information Security Management Act of 2002, Flaw hypothesis methodology, Footprinting, Forward anonymity, Four Horsemen of the Infocalypse, Fragmented distribution attack, Higgins project, High Assurance Guard, Host Based Security System, Host Proof Storage, Human-computer interaction (security), Inference attack, Information assurance, Information Assurance Vulnerability Alert, Information security, Information Security Automation Program, Information Security Forum, Information sensitivity, Inter-Control Center Communications Protocol, Inter-protocol communication, Inter-protocol exploitation, International Journal of Critical Computer-Based Systems, Internet leak, Internet Security Awareness Training, Intrusion detection system evasion techniques, Intrusion prevention system, Intrusion tolerance, IT baseline protection, IT Baseline Protection Catalogs, IT risk, IT risk management, ITHC, Joe-E, Kill Pill, LAIM Working Group, Layered security, Likejacking, Linked timestamping, Lock-Keeper, MAGEN (security)...and much more

This book explains in-depth the real drivers and workings of SIEM - Security Information and Event Managers. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of SIEM - Security Information and Event Managers with the objectivity of experienced professionals.

Product Details

ISBN-13:
9781743048955
Publisher:
Emereo Pty Ltd
Publication date:
08/29/2011
Pages:
436
Product dimensions:
8.27(w) x 11.69(h) x 0.89(d)

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews