This website uses cookies to make the content more user-friendly and effective. By using this website, you agree to the use of cookies. You can find additonal information about the use of cookies and the possibility of objecting to the use of cookies here.

8 - 10 October 2019 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2018
Zoom product LOGO_Security Information and Event Management (SIEM), Monitoring, Detection & Reporting

Security Information and Event Management (SIEM), Monitoring, Detection & Reporting

LOGO_Security Information and Event Management (SIEM), Monitoring, Detection & Reporting

Security Information and Event Management (SIEM), Monitoring, Detection & Reporting

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.

Information on data protection can be found here.

Send
Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitors and Products Database, the supporting programme and the TicketShop.

An error has occurred.

The detection of conspicuous behaviour within the in-house systems is a crucial point of today’s cyber security. However, most threats will remain undetected. Attacks are more and more professionally prepared, highly elaborated and designed as advanced persistent threats and multi-staged IT security incidents for long-term use and damage. Over weeks and sometimes months, attackers move undetectedly about the in-house network, withdrawing continually information or waiting for the opportune moment to interfere.

But all is not lost, because these threats for your business continuity can be identified, e.g. via deliberate intrusion detection and threat detection. With an automated 24/7-observation of the network behaviour and the data communication by using an enterprise threat detection system (ETD) as well as trained experts suspicious developments or actions can already be detected in an early stage. In doing so, however, enormous data amounts have to be considered with regard to the observation and investigation of the network traffic and information flows. Therefore, in-memory technologies are suited best to serve as a basis to evaluate and assess these huge data amounts effectively and in real time as well as to derive reliable forecasts.
Security Information and Event Management (SIEM)

If such tools and methods are intelligently interconnected with a security information and event management (SIEM), the daily defense will be significantly more efficient and reliable. SIEM solutions work similar to a ticket management system in a central IT service thus offering an overview about all incidents, containing guidelines and workflows concerning the reaction to and treating of IT security incidents while at the same time documenting all security-relevant processes. The respective sensor and log files can be transmitted automatically to the central cyber security operation center (SOC) to intervene as soon as possible and to take countermeasures accordingly to the criticality level of the incident. Digital forensic investigations of such incidents form the basis to be equipped better for future similar cyber attacks.

Cyber Security Consulting & Compliance

LOGO_Cyber Security Consulting & Compliance

Managed Security Services, Security as a Service, Security Intelligence

LOGO_Managed Security Services, Security as a Service, Security Intelligence

Identity & Access Management, Privileged User Management, Multi-Factor-Authentication

LOGO_Identity & Access Management, Privileged User Management, Multi-Factor-Authentication

Penetration Testing, Vulnerability Scans & IT-Sicherheitsanalysen

LOGO_Penetration Testing, Vulnerability Scans & IT-Sicherheitsanalysen

Security Information and Event Management (SIEM), Monitoring, Detection & Reporting is assigned to following product groups:

top

The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.