The security information management (SIM) market is crowded, and it can be difficult to readily differentiate between solutions. Read these tips to help guide you through your process.
http://www.openservice.com/resources/security-white-papers.jsp
Hackers are Real-Time: Are you?
To meet the Sarbanes-Oxley general IT security requirements, organizations need to deploy multiple security point solutions such as firewalls, intrusion detection systems, anti-virus systems and others.Security Information Management, Worms and Viruses
... recent virus and ... worm attacks have shown, there is still great ... in ... viruses from ... despite signiExploit Detection and Vulnerability Correlation
... ... is key to reducing the false positive rate. The risk of any one attack clearly depends on whether or not the targe