cyber security tagged posts:

SIEM – Intel IT’s Security Business Intelligence Architecture

September 16th, 2014 |
SIEM – Intel IT’s Security Business Intelligence Architecture

IT Best Practices: Intel IT’s SIEM architecture is based on three layers: common logging service, correlation layer, and predictive analytics. This security BI architecture consumes almost 4 billion events per day to deliver near real-time trends and reporting.

See also: SIEM ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , ,

Inside IT: Faster Threat Detection with Security Business Intelligence

September 9th, 2014 |
Inside IT: Faster Threat Detection with Security Business Intelligence

IT Best Practices: Episode 83 – Cyber security in the enterprise has evolved because the threat landscape has changed so dramatically. That’s certainly true at Intel. Tony Saint, is Intel IT’s Cyber Security Operations Manager. Like all security specialists in ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , ,

SIEM – Intel IT’s Security Business Intelligence Architecture

November 13th, 2012 |
SIEM – Intel IT’s Security Business Intelligence Architecture

SIEM architecture – Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.. This security BI architecture consumes 4 billion events per day to deliver near real-time reporting.

Share
Download Video FileWatch/download video  

Categories: Big Data, Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Technology Tags: , , , , , , , , , ,