Turn Down the Noise and Improve Results With Co-Managed SIEM

MSPMentor Cybersecurity is like a noisy concert. In the background, accomplished musicians are constantly tuning their instruments and listening for both known and emerging tones that indicate cyber risks and threats. In the front is a wall of audio dissonance created by wailing synthesizers – security information and event management (SIEM) systems producing constant alerts […]

Read more

SAO vs. SIEM security suites: And the winner is…

TechBeacon Security information and event management (SIEM) suites offer organizations a security blanket against cyber attacks, but that blanket has become frayed for many SIEM shops. As many as one in three SIEM owners are dissatisfied with their SIEM system’s performance, according to a report released in July by Osterman Research and Cyphort, maker of […]

Read more

Netsurion, EventTracker Launch Free Self-Assessment for Ransomware Risk

DarkReading As point-of-sale (POS) malware continues to pummel retailers and brands, ransomware attacks are aggressively increasing in scope and frequency around the globe. If cybercriminals put the two trends together, they can impact most or even all locations of large chains by locking up the POS system itself—the mission-critical nerve center of payment card-accepting merchants […]

Read more

5 Companies That Came To Win This Week

CRN EventTracker made CRN’s July 14 list of “5 Companies that Came to Win this Week” for launching its new Partner Program. “EventTracker, which historically focused on direct sales, is looking to pivot toward the channel with this week’s launch of its EventTracker Partner Program. The three-tiered program, designed to provide a quick time-to-value for partners, […]

Read more

New Warnings of More Ransomware Attacks On the Way

Credit Union Times Newly discovered credit card data breaches point out the need to defend against hackers, who have flooded the dark web with personal information and opened the door to more ransomware attacks. Cybersecurity experts maintain, credit card machines and point-of-sale devices are preferred targets of hackers, because the data pinched is very easy […]

Read more

Can EventTracker Cybersecurity Partner Program Transform MSPs Into MSSPs?

MSSP Alert EventTracker has launched a new partner program centered around managed security services, in a move to formalize the SIEM provider’s channel strategy. The new framework, which nods at the increasing importance of MSSPs, offers a path for traditional MSPs to incorporate managed security services into their portfolios and augment their overall capabilities, EventTracker said. […]

Read more

CRN Exclusive: EventTracker Launches New Partner Program For MSPs

CRN A historically direct sales company, EventTracker is now looking pivot towards the channel, starting Tuesday with the launch of a new partner program. EventTracker has worked with partners in the past, but Vice President of Alliances Guy Cunningham said it has never had a “real focus” on partners and worked primarily ad hoc with the […]

Read more

CU InfoSecurity 2017: Honeynets & Cybersecurity Economics

Credit Union Times Implementing honeynets and web application firewalls, avoiding malware and zero day attacks, and the economics of cybersecurity, were among the topics covered at the CU InfoSecurity 2017 conference in San Diego. Like many businesses, credit unions incur steep losses in reestablishing member safety following a data breach, whether online or otherwise. […]

Read more

Credit Union InfoSecurity Conference Session to Watch: How Honeynet Decoy Networks Can Trap Hackers and Protect Your Data

ITSP Magazine Like many businesses, credit unions incur steep losses in reestablishing member safety following a data breach, whether online or otherwise. On average, credit unions in 2014 spent $136,000 on data security measures and $226,000 in costs associated with merchant data breaches, according to the National Association of Federally-Insured Credit Unions. However, there are […]

Read more

Gartner Magic Quadrant: Security Information and Event Management (SIEM) for MSSPs?

MSSP Alert Fourteen cybersecurity companies landed in Gartner’s Magic Quadrant for Security Information and Event Management (SIEM). But which of those SIEM providers have friendly MSSP (managed security services provider) offerings? We took a closer look at Gartner’s August 2016 Magic Quadrant results. (Yes, we’ll take another look when the 2017 results arrive.) Then, we […]

Read more

Best Log Management Tools: 50 Useful Tools for Log Management, Monitoring, Analytics, and More

Stackify EventTracker is listed in Stackify’s “50 Useful Tools for Log Management, Monitoring, Analytics, and More” list, which they built to provide an easy reference for anyone wanting to compare the current offerings to find a solution that best meets your needs. Check out the full list on their website, here. […]

Read more

WannaCry: What It Is And What To Do About It

Information Security Buzz A blog post by A.N. Ananth, CEO of EventTracker, on the recent WannaCry ransomware attack has been published by Information Security Buzz. Check out the article here to find out: What it is How it spreads Technical details Steps for prevention What happens next […]

Read more

IHG data breach, cyber experts weigh in on curing POS problems

SC Magazine The recent revelation by the InterContinental Hotels Group that 1,200 of its locations had been victimized by malware placed on its front desk point-of-sale (PoS) systems should spur companies to ensure their equipment is locked down and monitored. EventTracker CEO, A.N. Ananth, and EventTracker and Netsurion CISO, John Christy, both commented on the […]

Read more

Cyber Security Global Collaboration – ISBuzz Expert Panellists’ views

InformationSecurityBuzz A.N. Ananth, CEO of EventTracker, answers the March question for the InformationSecurityBuzz panel question: Cyberattacks has no boundaries and hackers usually collaborate across boundaries, while law enforcement agencies not. How can we collaborate at global level to fight against these new type of attacks with no boundaries? See what he says about data breach […]

Read more

PayThink: Trusted ‘co-sourcing’ can help issuers manage complex e-security rules

PaymentsSource New data and web security regulations in New York may be tough for issuers to follow, but there’s space in the rules to get help from outside parties. The law, 23 NYCRR 500, which took effect on March 1, 2017, is in response to the increasing cybersecurity threats posed to customer information. Recognizing that […]

Read more

Cybersecurity Tactics for a Hotel Industry that’s Under Siege

Hospitality Technology Credit card fraud and identity theft should remain high on the hotel and lodging industry’s radar. Just ask Starwood Hotels & Resorts Worldwide (including their Westin, Sheraton and W Hotel brands), Hilton, Hyatt and the Trump Hotel Collection, all of which were victims of highly publicized, major breaches in the hospitality industry last […]

Read more

Security as a service is becoming a market game-changer

Third Certainty SIEM as a service is becoming increasingly popular with SMBs that want to see measurable results with security and compliance. This article published in Third Certainty highlights EventTracker’s solution, SIEMphonic, and thoughts from our CEO, A.N. Ananth. “We think that a lot of the criticism that people had for SIEM in years past […]

Read more

How managed security can close the cybersecurity skills gap

IT Pro Portal SIEM is a key technology in a company’s security arsenal that should be considered an essential tool in defending against intrusions. Recent studies are continually linking an organisation’s lack of staffing and skills to its ability to fend off cyberattacks. Market research firm Vanson Bourne interviewed 775 IT decision makers involved in […]

Read more

Small businesses are prime targets for cyber attacks: SIEM-as-a-service can help

Network World Threats are becoming more pervasive and more sophisticated, and small businesses that thought they were below the radar are now prime targets. Just last year, a breach resulting in malware infection of Oracle’s MICROS point-of-sale system, used in more than 330,000 cash registers around the world, put numerous retailers at risk of data […]

Read more

Netsurion Debuts SIEM-at-the-Edge and Breach Detection Services

Security firm Netsurion is launching its first new services since acquiring security information and event management (SIEM) vendor EventTracker in October 2016. The new SIEM-at-the-Edge and Breach Detection Services expand Netsurion’s product portfolio bringing advanced threat detection and mitigation capabilities to small businesses and branch offices. Netsurion CEO Kevin Watson explained that the new […]

Read more

New products of the week 12.19.2016

Network World Network World’s roundup of new products for the week of December 19 includes EventTracker’s new SIEMphonic offering. EventTracker SIEMphonic is a comprehensive managed security service, spanning SIEM, intrusion detection, vulnerability scanning, threat intelligence, and HoneyNet technology, supported by a 24×7 iSOC. […]

Read more

New products of the week 11.14.16

Network World Network World’s roundup of new products for the week of November 14 includes EventTracker’s new HoneyNet offering. EventTracker HoneyNet is a managed security service that enables any-sized enterprise to add a deception network layer to its cybersecurity defenses. […]

Read more

The Doyle Report: Where to Find Growth in 2017

MSPMentor T.C. Doyle has spent the better part of 2016 traveling the industry and talking with thought leaders and practitioners alike. From his interviews — including one with EventTracker’s A.N. Ananth — he concludes that solution providers can grow their businesses in 2017 by pursuing one or more of these options: Take Advantage of ICT […]

Read more

Honeypots Versus Threat Intelligence

Information Security Buzz When faced with daily reports of security breaches in global entities like SWIFT and Fortune 500 companies, and small enterprises being held hostage with ransomware, it’s understandable that finding and buying the ‘Next Big Thing’ in security is paramount on your IT security wishlist. However, before investing resources and funds in the […]

Read more

Netsurion and EventTracker Merge to Boost SIEM Capabilities

Privately held security vendor Netsurion announced on Oct. 13 that it is merging with security information and event management (SIEM) vendor EventTracker. Financial details of the merger are not being publicly disclosed, though the deal is being facilitated by Providence Strategic Growth, which already has made equity investments in Netsurion. Netsurion is a provider […]

Read more

Managed Security Services Provider Netsurion Acquires SIEM Vendor EventTracker

CRN Over the past year or so, threat vectors for Netsurion’s customers have changed drastically, and CEO Kevin Watson said the managed security services provider knew it had to take a different approach. The Fort Lauderdale, Fla.-based company said Thursday it will merge with security information and event management (SIEM) vendor EventTracker, a move Watson […]

Read more

Netsurion, EventTracker merge, aim to bolster SMBs against complex cyberattacks

ZDNet Netsurion and EventTracker, two security companies, are merging in a move that aims to bring more enterprise-grade cybersecurity defenses to small and mid-sized businesses. The two companies focus on different niches. Netsurion offers managed security services for distributed networks and multiple locations. EventTracker focuses on security information and event management (SIEM) tools. […]

Read more

Meeting Ransomware Threats with SIEM

LegalTech News It used to be that security technologies comprised a preventative toolset including firewall, antivirus, web and email gateways. There was a clear distinction between “do-it-yourself” security approaches and those more complex engagements that required outsourcing. But as the threat landscape became increasingly multi-faceted, and the techniques employed by cybercriminals more sophisticated, new security […]

Read more

Analyst: Brexit Cybersecurity Ramifications Could be Significant

Infosecurity Magazine After 43 years of inclusion, the UK has voted to leave the European Union in the historically unprecedented “Brexit” referendum vote. Aside from causing uncertainty in the world’s financial markets and across the political landscape, the result has implications for cybersecurity too. EventTracker’s CEO, A.N. Ananth, comments on these cybersecurity implications of Brexit […]

Read more

After trio of hacks, SWIFT addresses information sharing concerns

SC Magazine On the heels of published reports of a cyberattack last year in which hackers stole $9 million from an Ecuadorean bank, the Society for Worldwide Interbank Financial Telecommunication (SWIFT) has issued a statement to its customers stating that the financial messaging system is taking steps to create more information sharing practices among its […]

Read more

What are the Challenges and Benefits of Outsourcing Security Functions?

Information Security Buzz EventTracker’s CEO, A.N. Ananth, answers the Informtion Security Buzz panel question for May, which discusses outsourcing security functions: Gartner forecasts that the total security outsourcing market will grow from $14.1 billion in 2014 to $24.5 billion in 2019 at a compound annual growth rate (CAGR) of 14.8% — making it the highest-growing […]

Read more

Ransomware attacks prompt warnings to House members

SC Magazine EventTracker CEO, Ananth, is quoted in response to an increase in ransomware attacks at the U.S. House of Representatives. The attacks came via phishing emails that contained encrypted attachments with ransomware as zip file e-mail attachments. […]

Read more

Debate» To automate or not? You must realize the limitations of your incident response technology

SC Magazine EventTracker CEO, Ananth, argues against automating incident response in SC Magazine’s Debate column. […]

Read more

Views on Cybersecurity, ‘Secure the Human’ and 2016 Concerns

Bloomberg BNA Privacy & Security Law Report Generally, employees make up the weakest link in the cybersecurity chain for companies. Bloomberg BNA Privacy & Data Security News Senior Legal Editor Jimmy H. Koo posed a series of questions to A. N. Ananth, Chief Executive Officer of EventTracker, about improving workplace security, cybersecurity skills that are in high demand […]

Read more

New products of the week 08.03.2015

Network World EventTracker version 8 made Network World’s list of Products of the Week for the week of August 3, 2015. […]

Read more

Why PCI DSS 3.1 has Followed 3.0 so Quickly

InfoSecurity Magazine PCI SSC has issued PCI DSS 3.1 outside its usual cycle in order to respond to threats. So what’s the emergency? A.N. Ananth, CEO of EventTracker, discusses the release in this article published by InfoSecurity Magazine. […]

Read more

Cool Tool – EventTracker

EdTech Digest Educational institutions face unique security challenges due to their open networks, essential for facilitating a collaborative exchange of information and ideas. EdTech digest wrote a brief review of EventTracker, highlighting its benefits for educational institutions. […]

Read more

PCI DSS 3.1 – What Retailers Need to Know

Guest blog by EventTracker CEO, A.N. Ananth for Solution Providers for Retail The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit cards from major cards such as Visa, and MasterCard, to name a few. Merchants should know that PCI DSS v3.0 went into […]

Read more

When you Can’t Stop a Breach, you Should Still be Able to Spot it

Information Security Buzz A.N. Ananth, CEO of EventTracker, explains the importance of spotting a breach and how it’s possible with new process detection. Retailers have had an Annus Horribilis to quote Queen Elizabeth II. Target, Home Depot, Michael’s, Dairy Queen, Sony – the list is endless. What is going wrong? Mark Kedgley notes that the […]

Read more

5 Laws of IT Security

MSPMentor Blog EventTracker CEO, A.N. Ananth, guest blogs in this edition of MSPMentor to bring you the Top 5 Laws of Security. 1. There is no such thing as perfect security: Systems designed by humans are vulnerable to humans. Bugs exist. Mistakes are made. The things that make your computers useful–that is, communication, calculation and […]

Read more

If you Set and Forget, you will Regret

Information Security Buzz Overworked system administrators and their equally harried managers everywhere would love to hear from vendors that some SILVER BULLET security technology will keep them safe from all harm merely by plugging it in (and paying the vendor, of course). […]

Read more

Distribution veteran unveils new security VAD

Channel Pro UK Former Codework founder, Divyesh Lakhani, has lifted the curtain on a new security distribution venture that he claims is dramatically different to its rivals. Lakhani claims Distology will bring security software to UK resellers that tackles the challenges brought by cloud computing, mobility, social computing and big data. […]

Read more

The Seven Habits of Highly Fraudulent Users

Information Security buzz This post from Izzy at SiftScience describes patterns culled from 6 million transactions over a three month sample. The “fraud” sample consisted of transactions confirmed fraudulent by customers; “normal” samples consisted of transactions confirmed by customers to be non-fraudulent, as well as a subset of unlabeled transactions. […]

Read more

What Is a Stolen Credit Card Worth?

Solution Providers for Retail Cybercrime and stealing credit cards has been a hot topic all year. From the Target breach to Sony, the classic motivation for cybercriminals is profit. So how much is a stolen credit card worth? The reason it is important to know the answer to this question is that it is the […]

Read more

Whitepaper: Why EventTracker is the Best Choice for Security Information and Event Management

MSPmentor Offers a brief overview of the top 6 reasons EventTracker should be your security information and event management solution. Read the full whitepaper at MSPmentor […]

Read more

Gartner Rates Security Solutions in Annual Magic Quadrant Report

Enterprise Security Today Gartner has just published its annual Magic Quadrant report for Security Information and Event Management (SIEM) Technology. In its report, the industry research firm rates 15 vendors on how their products address customers’ needs for security intelligence and analytics, ranking them on their ability to execute and completeness of vision. […]

Read more

EventTracker 7.6: Digging Into Details for Intrusion Detection

Virtualization Review Finding security problems isn’t easy, with all the information generated by a typical datacenter. It’s worth your time to investigate solutions. A. N. Ananth, CEO of EventTracker, visited to introduce himself and his company, and to discuss the need for comprehensive security information and event management (SIEM). […]

Read more

Security opportunities for MSPs

Computer Dealer News What is the biggest thing in tech news today? It’s not the cloud, and it’s definitely not “managed services.” With the advent of things like Office 365, it’s just not all that interesting anymore to tell a client that you “take care of everything.” So what’s the thing everyone’s talking about that […]

Read more

IT Supply Chains – Under Siege

A recent Gartner report finds that enterprise IT supply chains will be targeted and compromised, forcing changes in the structure of the IT marketplace and how IT will be managed moving forward. […]

Read more

SMBs Can Meet Compliance Regulations with Cloud-Based SIEM Solution

IT Business Edge IT Business Edge interviews EventTracker’s A.N. Ananth about the use of cloud-based SIEM technology, like EventTracker Cloud, to meet regulatory compliance in small and midsized businesses. […]

Read more

EventTracker Cloud: it’s not a SIEM; it’s an early-warning system

451 Group This paper, written by analyst Javvad Malik of the 451 Group, discusses EventTracker Cloud, a SaaS monitoring product for networks, systems and applications. At the lowest level, EventTracker Cloud offers free alerting via text or email for up to 100 systems, and provides customers with a low-cost method to monitor any potential security […]

Read more

NetworkWorld – Products of the Week

NetworkWorld EventTracker Cloud is featured as one of NetworkWorld’s Products of the Week. […]

Read more

The State of Encryption, Part 1: Where Are We Now?

IDG Connect NSA revelations have placed an increased emphasis on encryption, with MIT Tech Review labeling 2014 “The Year of Encryption”. In a two part special, IDG Connect speaks to seven industry experts, including EventTracker’s CEO, A.N. Ananth, about the various technical and social aspects of this security technique. […]

Read more

Small Retailers, Big Target

Ananth’s guest blog discusses why retailers are big targets for hackers and lists some simple steps retailers can take to avoid a POS breach. […]

Read more

The healthcare USB storage device security conundrum

Solution Providers for Retail Ananth’s guest blog discusses why retailers are big targets for hackers and lists some simple steps retailers can take to avoid a POS breach. […]

Read more

How To Avoid Breaches Where You Least Expect Them

A.N. Ananth comments as a security expert on how to detect attacks in less critical systems. […]

Read more

Changeable default passwords are not seen as vulnerabilities by ICS-CERT, but should they be?

While responding to a vulnerability report submitted in April, ICS-CERT told a researcher that documented, changeable default passwords are not vulnerabilities. But given the risk behind default passwords and the focus on critical infrastructure security, shouldn’t such things be considered an issue? A.N. Ananth is one of the experts that disagrees with ISC-CERT, believing that the issue is severe. […]

Read more

Top 15 Indicators Of Compromise

A.N. Ananth comments as an IT Security expert on the key indicators of a data breach. Read the full article in DarkReading, here. […]

Read more

7 Starter Steps For Security Analytics Success

A.N. Ananth comments on how to quickly improve analytics work to better understand IT risks and adjust security practices in this DarkReading article. […]

Read more

Getting the Compliance Budget “Just Right”

A risk aware, long-term approach to regulatory compliance budgets is the path toward optimized spending. EventTracker’s AN Ananth explains his Goldilocks strategy. […]

Read more

The keys to a compliance-ready records retention schedule

A.N. Ananth comments on how to maintain different regulatory compliance standards with data retention plans and other compliance policies. […]

Read more

In Fight Against Hacktivists, Financial Firms Need Layers of Security

EventTracker’s CEO, A.N. Ananth comments on how companies should increase security to protect their networks from hacktivists and disgruntled employees. […]

Read more

The evolution of Security and Information Event Management systems

EventTracker’s CEO, A.N. Ananth comments on the change in SIEM solutions over time, and how social media and the cloud has impacted their growth. […]

Read more

What Snowden’s thumb-drive stash of NSA secrets means for feds

EventTracker’s CEO, A.N. Ananth, comments on the recent leak of classified information by former NSA contract employee Edward Snowden, who allegedly copied the information onto a thumb drive. […]

Read more

SC Magazine 5-Star Review

EventTracker has received a 5-star rating and a recommendation from SC Magazine. Strengths: This product is a well-designed enterprise-class tool. Weaknesses: Hard to find a substantial weakness. Verdict: Version 7.3 of EventTracker Enterprise is a big leap forward in SIEM technology. Recommended. […]

Read more

IT security: Luxury or commodity in these uncertain times?

A.N. Ananth’s article discusses how the IT security budget will fare as spending is closely examined to prepare for budget cuts. […]

Read more

Thieves, spies move to AVTs: advanced volatile threats

A.N. Ananth comments on the emergence of Advanced Volatile Threats and what it could mean for the future of cyber threats. […]

Read more

Worry Not Because the Threat Is from China, But Because the Threat Is Real

IT Business Edge A.N. Ananth comments on protecting not only against the Chinese security threat, but cyber threats in general in this article by IT Business Edge. […]

Read more

Obama’s cybersecurity executive order issued for critical infrastructure

Jagat Shah comments on the executive order issued by Obama that aims to create voluntary cybersecurity standards and best practices. […]

Read more

7 Routes To Reducing The Compliance ‘Tax’

A.N. Ananth discusses how companies that use a top-down approach when it comes to regulatory compliance can significantly reduce costs. […]

Read more

Analysts Recommend Diligent Network Monitoring for Public Sector Cyber Security

A.N. Ananth discusses the need for the public sector to take threats seriously and monitor their networks diligently. […]

Read more

Disable Java? For agencies, the real question is: Why not?

A.N. Ananth discusses the pros and cons of disabling Java in government agencies. […]

Read more

Jettisoning Java: Damned if You Do, Damned if You Don’t

A.N. Ananth discusses the pros and cons of disabling Java to guard against a zero-day attack. […]

Read more

Vigilant Network Monitoring Recommended for Public-Sector Cybersecurity in 2013

A.N. Ananth discusses the need for the public sector to monitor their networks diligently, and to think smart. […]

Read more

Global DataGuard and EventTracker to Host Webinar on ‘Big Data’ Analysis and Advanced Persistent Threats

See the article from Global DataGuard here. […]

Read more

Global DataGuard and EventTracker to Host ISSA Discussion on 2012 Threat Landscape and ‘Big Data’ Analysis.

Global DataGuard® and EventTracker by Prism Microsystems® are hosting an informative exchange of knowledge on today’s threat landscape and how ‘big data’ analysis and correlation is changing the way in which security professionals are now able to detect and prevent complex, evolving attacks such as Advanced Persistent Threats (APTs). […]

Read more

SmartCEO Magazine May 2012 Our CEO, A N Ananth, is featured as a VOLT Awards Finalist for being a Leader in Technology.

A N Ananth, is featured as a VOLT Awards Finalist for being a Leader in Technology […]

Read more

Global DataGuard and Prism Microsystems to Host Webinar on Managed SIEM

Global DataGuard® and EventTracker by Prism Microsystems® are hosting an informative webinar and live demonstration on Security Information and Event Management (SIEM). […]

Read more

TechNewsWorld – Sept. 9, 2011: WikiLeaks Stews in Its Own Juice

The propagation of mobile devices and writable media such as USB devices and read/write CD/DVD drives has led to an increase in productivity across organizations, but has provided an increased threat from malicious insiders, John Sennott, director of marketing for Prism Microsystems told TechNewsWorld. […]

Read more

Network World – May 26, 2011

Oklahoma City using EventTracker’s SIEM to crack down on hackers – and wayward employees. […]

Read more

SC Magazine – May 2, 2011

“[EventTracker is] probably the most feature-rich SIEM we looked at…” says SC Magazine in giving EventTracker the coveted 5-Star rating. […]

Read more

Government Security News, ‘SIEM/Log Management simplifies government compliance'

A.N. Ananth’s featured article discusses how government agencies can overcome and prevent IT security and regulatory compliance problems by implementing a SIEM/Log Management solution. […]

Read more

SC Magazine ‘A security manager’s wish list’

A.N. Ananth sets his predictions for the security manager’s 2011 wish list Read Article […]

Read more

ETM Podcast: December 2010

Dr. Anton Chuvakin leads an all-star panel to provide some useful information on SIEM for enterprises and small organizations. He is joined by A. N. Ananth (Prism Mircosystems), Nick Briers (IBM Tivoli) and Brain Singer (Novell). […]

Read more

Information Management Magazine: July/Aug 2010

MSSP monitors disparate customer environments with EventTracker. Read article […]

Read more

Infosecurity

There’s really no excuse, given that computing logs have been around for as long as the seminal sci-fi show. “Logs were there in the IBM System 360, 40 years ago, pretty much for the same reason that they’re there in VMware version 4.0 – to tell administrators what’s going on” […]

Read more

CIO

Is VM stall the next big virtualization challenge? Read article […]

Read more

Redmond Magazine

Self-serving virt report probably right. Read article […]

Read more

IT Business Edge

Virtual security: Pros worried, but not doing much about it. View slideshow […]

Read more

Blog – Pleasediscuss.com

Does virtualization security really matter? Read blog post […]

Read more

Campus Technology

Could virtualized servers present security holes? Read article […]

Read more

eSecurity Planet

Virtualization and security. Read article […]

Read more

Enterprise Systems

Reports confirm virtualization’s growing popularity. Read article […]

Read more

eWeek

A practical guide to managing a virtual data center. Read article […]

Read more

Virtualization Review

The perilous state of virtualization security. Read article […]

Read more

CXO Today

Security not keeping pace with virtualization. Read article […]

Read more

eWeek

Virtualization security falls short among enterprises, survey says. Read article […]

Read more

Dark Reading

IT Pros doubt security of virtualized environments, survey says. Read article […]

Read more

Help-Net Security

Low confidence in virtual environment security. Read article […]

Read more

Network Computing

“Prism Microsystems has created a knowledge-base that is integrated with their Event Tracker log management system, providing descriptions of events, sources for further information, and it can include user notes and recommendations, as well. ” Read article […]

Read more

SC Magazine

“It [EventTracker] doesn’t miss a beat. It essentially gives me the eyes and ears going through the events, so I can be out doing other things, getting more information, figuring things out, setting more alerts and correlating behind the scenes.” This SIEM tool has changed the way LeHigh Valley Hospital Network approaches security and compliance management. […]

Read more

Ovum/Butler Group

8-page indepth technical review of EventTracker. […]

Read more