Search

Best practices : security information management

Recurso electrónico / electronic resource
MARC record
Tag12Value
LDR  00000nam a22000004b 4500
001  MAP20080028428
003  MAP
005  20191202111856.0
008  080918s2007 usa|||| ||| ||eng d
040  ‎$a‎MAP‎$b‎spa
084  ‎$a‎86
1001 ‎$0‎MAPA20080651589‎$a‎Stamp, Paul
24510‎$a‎Best practices‎$b‎ : security information management‎$c‎by Paul Stamp with Jonathan Penn and Alissa Dill
260  ‎$a‎Cambridge‎$b‎Forrester Research‎$c‎2007
4901 ‎$a‎For Security & risk professionals
520  ‎$a‎Security Information Management (SIM) solutions are no longer the sole domain of the largest organizations. More than one third of enterprises plan to deploy SIM tools by the middle of 2008, and those that have invested the time and effort in the tools already are reaping the benefits, streamlining existing processes, and implementing active monitoring controls where there were none previously. Successful organizations get the best benefit from their SIM implementations when they establish their immediate SIM needs clearly, but have a clear vision for what they want SIM to deliver in the future
650 1‎$0‎MAPA20080622251‎$a‎Seguridad de la información
650 1‎$0‎MAPA20080569815‎$a‎Organizaciones
650 1‎$0‎MAPA20080617059‎$a‎Gestión de la información
650 1‎$0‎MAPA20080603731‎$a‎Seguridad informática
7001 ‎$0‎MAPA20080648176‎$a‎Penn, Jonathan
7001 ‎$0‎MAPA20080648183‎$a‎Dill, Alissa
7102 ‎$0‎MAPA20080436582‎$a‎Forrester
830 3‎$0‎MAPA20080648190‎$a‎For Security & risk professionals