Comparing enterprise data anonymization techniques

July 31, 2012 admin 0

There comes a time when data needs to be shared — whether to evaluate a matter for research purposes, to test the functionality of a new application, or for an infinite number of other business purposes. To protect sensitivity or confidentiality of shared data, it often needs to be sanitized before it can be distributed and analyzed. […]

SC eSymposium: SIEM

July 25, 2012 SecurityOrb_Staff 1

Security information and event management (SIEM) systems are a critical part of any organization’s defense. By correlating and giving meaning to data from any number of tools — from intrusion detection systems and firewalls to web logs or flow data — SIEMs allow security teams to understand what’s happening on their networks. However, they can be difficult to deploy and sometimes even harder to make work. We explore just how some companies find help from SIEMs and what organizations be mindful of as they look to deploy these. […]

1 2 3