Event data analysis

Driven by compliance and data protection needs, over the last couple of years, SIM has proven to be an effective tool for financial services firms. But how do you know you're getting the most out of your SIM? We've gathered some of our best expert advice on the subject to answer this question and more.

This Content Component encountered an error

Best of 2008
Secure communications

Emerging themes in IAM
Driven by compliance and data protection needs, over the last couple of years, security information management (SIM) has proven to be an effective tool for financial services firms. But how do you know you're getting the most out of your SIM? We've gathered some of our best expert advice on the subject to answer this question and more.

SIM appliance helps credit unions with compliance, incident response
When new federal IT requirements requiring credit unions to have a forensics trail in the event of a breach came out, one credit union turned to SIM. Learn how they found a TriGeo device an affordable way to streamline security management.

Security information management finally arrives, thanks to enhanced features
SIM has been a problematic security category for years, but that problem may have been solved. In this tip, Mike Rothman reveals how network-behavior analysis and log management technologies have brought some new life to the SIM market.

Don't miss need-to-know info!
Security pros at financial organizations can't afford to be the last to know. Sign up for email updates from SearchFinancialSecurity.com and you'll never be behind the curve!

How to get the most out of a SIM
A security information management product is perhaps one of the least exciting types of information security products available today, but it can be one of the most beneficial. According to expert Joel Snyder, a financial organization should look beyond the traditional security and compliance benefits of a SIM in order to make the most of the investment.

Establishing a practical routine for reviewing security logs
In this tip, security expert Lenny Zeltzer shares the joy that comes with correlating seemingly unrelated events, and offers helpful hints to make your log-reviewing efforts a success every time.

This was first published in December 2008

Dig deeper on Network security devices for financial institutions

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchSecurity

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

ComputerWeekly

Close