 |
IT Best Practices: Intel IT’s SIEM architecture is based on three layers: common logging service, correlation layer, and predictive analytics. This security BI architecture consumes almost 4 billion events per day to deliver near real-time trends and reporting.
See [See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: Big Data, cyber security, Enterprise Security, information security, information technology, Insider Threats, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, SEIM
 |
IT Best Practices: Episode 83 – Cyber security in the enterprise has evolved because the threat landscape has changed so dramatically. That’s certainly true at Intel. Tony Saint, is Intel IT’s Cyber Security Operations Manager. Like all security specialists [See the full post…] |
Listen/download audio
|
|
Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: Audio Podcast, cyber security, information technology, innovation, Inside IT, Intel, Intel IT, IT Best Practices, IT Business Value, IT@Intel, Security, Security Business Intelligence, threat detection, Tony Saint
Categories: Big Data, Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Technology Tags: Alan Ross, Big Data, Cyber Risk Management, cyber security, Enterprise Security, information security, Insider Threats, IT Best Practices, IT@Intel, Security Business Intelligence, SIEM