Exploit Detection and Vulnerability CorrelationWritten by Phil Hollows
Continued from page 1 used. So a critical success factor in reducing false positives is ability to intelligently incorporate relevant vulnerability scan information in real-time correlation process.http://www.openservice.com/solutions/vulnerability-correlation.jsp

Phil Hollows is responsible for marketing at OpenService.
| | Enabling Sarbanes-Oxley Security Monitoring ComplianceWritten by Phil Hollows
Continued from page 1 exploits launched internally), prove that security polices are being correctly followed, and provide an integral framework to identify threats and guide incident responses in a consistent, compliant, approved manner. The white paper also discusses how SIM can make enterprise security relevant to business operations, by aligning risk, threats and responses to lines of business affected.http://www.bitpipe.com/detail/RES/1097862548_724.html

Phil Hollows is responsible for marketing at OpenService.
|