CONTACT    SIGN IN    SIGN UP
    

EMA™ IT Management Research Library ADVANCED SEARCH


 Click here for New Advanced Search »  

Title Report Type Release Date  Author Abstract
Skybox Security Suite Provides Customers With Data-Driven Security Case Study 11/16/2016 David Monahan, Former EMA Analyst Information security problems abound. Though they may vary to some degree, it seems some problems are nearly universal and all get worse as organizations grow. Security policy standardization and unified enforcement, change management automation, bas...
Report Summary - EMA Research Report: Data-Driven Security Reloaded: A Look into Data and Tools Used for Prevention Detection and Response Research Report - End-User 09/21/2015 David Monahan, Former EMA Analyst This is a summary of the EMA Research Report: Data-Driven Security Reloaded: A Look into Data and Tools Used for  Prevention Detection and Response.Full Report AbstractSecurity professionals often wrestle with the unknown, struggling with a...
EMA Research Report: Data-Driven Security Reloaded: A Look into Data and Tools Used for Prevention Detection and Response Research Report - End-User 07/15/2015 David Monahan, Former EMA Analyst Security professionals often wrestle with the unknown, struggling with a daunting array of exposures and threats. They are not trying to identify the needle in the haystack but the needle in the stack of needles. Each activity within a network, syste...
Data-Driven Security Reloaded: Summary of Research Findings for Endpoint Threat Detection, Prevention, and Response White Paper 05/08/2015 David Monahan, Former EMA Analyst Information security has always been a large producer and consumer of data. More sophisticated best practices and expanding compliance and regulatory requirements have almost exponentially accelerated the production and consumption of data. Event and...
Data-Driven Security Reloaded: Summary of Research Findings - Damballa White Paper 04/16/2015 David Monahan, Former EMA Analyst Information security has always been a large producer and consumer of data. More sophisticated best practices and expanding compliance and regulatory requirements have almost exponentially accelerated the production and consumption of data. Event and...
Data-Driven Security Reloaded: Summary of Research Findings - Prelert White Paper 04/15/2015 David Monahan, Former EMA Analyst Information security has always been a large producer and consumer of data. More sophisticated best practices and expanding compliance and regulatory requirements have almost exponentially accelerated the production and consumption of data. Event and...
Page shows 6 rows of 6 total. Page accessed at 2020-09-18 12:08:03
 
FirstPrevious  Page of 1 with NextLast 


EMA on Facebook   EMA on LinkedIn   EMA on Twitter   EMA RSS   EMA on YouTube

EMA Services

IT Professionals

EMA can help you:

  • Support your decisions
  • Succeed with key projects
  • Align IT with the business

Learn More!

IT Vendors

EMA can help you:

  • Build the right product
  • Reach the right prospects
  • Establish market credibility

Learn More!

EMA Advisory Notes Service

An Affordable Way to Stay on Top of Key Trends & Industry Events

Subscribe now

EMA Premium Research Service

In-Depth Insight into IT Management Benefits, Challenges & Best Practices in the Enterprise

Subscribe now




©1996-2020 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show