... ... is key to reducing the false positive rate. The risk of any one attack clearly depends on whether or not the targe
http://www.open.com/solutions/vulnerability-correlation.jsp
Vulnerability correlation is key to reducing the false positive rate. The risk of any one attack clearly depends on whether or not the target system is vulnerable to the exploit being used. So a critical success factor in reducing false positives is the ability to intelligently incorporate relevant vulnerability scan information in the real-time correlation process.
http://www.open.com/solutions/vulnerability-correlation.jsp
Security Information and Event Management Vendor Selection Tips
The security information management (SIM) market is crowded, and it can be difficult to readily differentiate between solutions. Read these tips to help guide you through your process.Hackers are Real-Time: Are you?
To meet the Sarbanes-Oxley general IT security requirements, organizations need to deploy multiple security point solutions such as firewalls, intrusion detection systems, anti-virus systems and others.Security Information Management, Worms and Viruses
... recent virus and ... worm attacks have shown, there is still great ... in ... viruses from ... despite signi