Добавить в закладки
Наш форум
Правила Litmy.ru
Мы в Вконтакте
Подписка на RSS
Для правообладателей
Поиск книг:
Разделы сайта
Авторизация
Регистрация



Реклама


IBM QRadar Version 7.3 Planning and Installation Guide
Название: IBM QRadar Version 7.3 Planning and Installation Guide
Автор: Elias Carabaguiaz, Fabian Alfaro, Francisco Villalobos, Jeffry Arias, Kenneth Gonzalez, Warren Perez
Издательство: IBM Redpaper
Год: 04 Январь 2018
Формат: pdf
Страниц: 112
Размер: 6.4 mb.
Язык: English

With the advances of technology and the reoccurrence of data leaks, cyber security is a bigger challenge than ever before. Cyber attacks evolve as quickly as the technology itself, and hackers are finding more innovative ways to break security controls to access confidential data and to interrupt services. Hackers reinvent themselves using new technology features as a tool to expose companies and individuals. Therefore, cyber security cannot be reactive but must go a step further by implementing proactive security controls that protect one of the most important assets of every organization: the company's information.
This IBM® Redbooks® publication provides information about implementing IBM QRadar® for Security Intelligence and Event Monitoring (SIEM) and protecting an organization's networks through a sophisticated technology, which permits a proactive security posture. It is divided in to the following major sections to facilitate the integration of QRadar with any network architecture:
Chapter 2, "Before the installation" on page 3 provides a review of important requirements before the installation of the product.

Chapter 3, "Installing IBM QRadar V7.3" on page 57 provides step-by-step procedures to guide you through the installation process.

Chapter 4, "After the installation" on page 77 helps you to configure additional features and perform checks after the product is installed.

QRadar is an IBM Security prime product that is designed to be integrated with corporate network devices to keep a real-time monitoring of security events through a centralized console. Through this book, any network or security administrator can understand the product's features and benefits.


Автор: Semka 12-06-2018, 18:21 | Напечатать
 
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.




 Litmy.ru  ©2020-2023     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности