Security Information and Event Management

Followings are the interesting blogs from Security Information and Event Management domain:

To Know more about Security Information and Event Management Products & Services,

Sign In to FireCompass for FREE !!

6 Key Use Cases for Security Information and Event Management (SIEM)

The term Security Information and Event Management (SIEM) finds its origin from the combination of Security Information Management (SIM) and Security Event Management (SEM). Where SIM focuses on the collection and long-term storage of log files, SEM focuses on real-time monitoring of (suspicious) behaviour. SEM does this by aggregating and identifying interesting log entries (events),… Read More »6 Key Use Cases for Security Information and Event Management (SIEM)

Webinar- Mastering Next Gen SIEM Use Cases (Part3)

Explore in-depth Use Cases of Next-Gen Security Information and Event Management (SIEM) – Part 3 of 3 series.   What will you learn: Tools and techniques – understanding the taxonomy Top use cases for the SOC Attack surfaces Insider threat Credential theft Endpoint compromise Application attack Monitoring / Building / SWIFT Fraud Analytics and hunting playbooks for SWIFT About… Read More »Webinar- Mastering Next Gen SIEM Use Cases (Part3)

Webinar- Mastering Next Gen SIEM Use Cases (Part2)

Explore in-depth Use Cases of Next-Gen Security Information and Event Management (SIEM) – Part 2 of 3 series.   What will you learn: Tools and techniques – understanding the taxonomy Top use cases for the SOC Attack surfaces Insider threat Credential theft Endpoint compromise Application attack Monitoring / Building / SWIFT Fraud Analytics and hunting playbooks for SWIFT About… Read More »Webinar- Mastering Next Gen SIEM Use Cases (Part2)

Webinar- Mastering Next Gen SIEM Use Cases (Part1)

Explore in-depth Use Cases of Next-Gen Security Information and Event Management (SIEM) – Part 1 of 3 series.   What will you learn: Tools and techniques – understanding the taxonomy Top use cases for the SOC Attack surfaces Insider threat Credential theft Endpoint compromise Application attack Monitoring / Building / SWIFT Fraud Analytics and hunting playbooks for SWIFT About… Read More »Webinar- Mastering Next Gen SIEM Use Cases (Part1)