May 22, 2018

Do You Need a SIEM for Your Security in 2018?

Exploring the Benefits of SIEM

Security Information and Event Management (SIEM) is a marriage of Security Information Management (SIM) and Security Event Management (SEM) designed to provide a

Read More
May 08, 2018

How to Save Time and Money with Software Audit Defense

Working in the software industry can mean navigating a veritable minefield of licensed materials and products. Unexpected software audits come with the territory and can result in substantial

Read More
May 03, 2018

Retail Security Breaches — Top Brands and How They Were Attacked

The term “data breach” has become an all too familiar headline in today’s news. More companies than ever have experienced an unwanted technological infiltration that has exposed the personal

Read More
1
May 22, 2018

Do You Need a SIEM for Your Security in 2018?

Exploring the Benefits of SIEM

Security Information and Event Management (SIEM) is a marriage of Security Information Management (SIM) and Security Event Management (SEM) designed to provide a

Read More
May 08, 2018

How to Save Time and Money with Software Audit Defense

Working in the software industry can mean navigating a veritable minefield of licensed materials and products. Unexpected software audits come with the territory and can result in substantial

Read More
May 03, 2018

Retail Security Breaches — Top Brands and How They Were Attacked

The term “data breach” has become an all too familiar headline in today’s news. More companies than ever have experienced an unwanted technological infiltration that has exposed the personal

Read More
1

Do You Need a SIEM for Your Security in 2018?

Posted by GlassHouse Systems on May 22, 2018 2:18:20 PM

Exploring the Benefits of SIEM

Security Information and Event Management (SIEM) is a marriage of Security Information Management (SIM) and Security Event Management (SEM) designed to provide a technological bird’s eye view of potential security issues within a company. The SIEM system works by gathering flow data from all relevant areas and establishing normal patterns of use. It can then identify and alert the company to any abnormal activities that can indicate a breach of security. 

Read More

Topics: compliance, cyber security, endpoint, ibm, information protection, IT security, managed security, managed services, MSSP, online security, perimeter, phishing, qradar, ransomware, risk, Security, threats, Cognitive Security, email scams, hacking, cyber attacks, data breach, Managed Security Services, SIEM

How to Save Time and Money with Software Audit Defense

Posted by GlassHouse Systems on May 8, 2018 2:38:10 PM

Working in the software industry can mean navigating a veritable minefield of licensed materials and products. Unexpected software audits come with the territory and can result in substantial financial losses. An audit is designed to discover companies that are working with unlicensed materials. This isn’t always a result of piracy, but sometimes happens when licenses are incomplete or simply outdated.

Read More

Topics: ibm, SAM, software asset management, audit, ILMT, software audit defense

Retail Security Breaches — Top Brands and How They Were Attacked

Posted by GlassHouse Systems on May 3, 2018 11:12:12 AM

The term “data breach” has become an all too familiar headline in today’s news. More companies than ever have experienced an unwanted technological infiltration that has exposed the personal information of consumers. Not only does this harm a company’s relationship with its target market, it also exposes an extreme weakness in the electronic transference of data.

Read More

Topics: cyber security, IT security, managed security, MSSP, online security, phishing, ransomware, Security, data breach, Managed Security Services, Ransomware Detection