Búsqueda

Best practices : security information management

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<rdf:Description>
<dc:creator>Stamp, Paul</dc:creator>
<dc:creator>Penn, Jonathan</dc:creator>
<dc:creator>Dill, Alissa</dc:creator>
<dc:creator>Forrester</dc:creator>
<dc:date>2007</dc:date>
<dc:description xml:lang="es">Sumario: Security Information Management (SIM) solutions are no longer the sole domain of the largest organizations. More than one third of enterprises plan to deploy SIM tools by the middle of 2008, and those that have invested the time and effort in the tools already are reaping the benefits, streamlining existing processes, and implementing active monitoring controls where there were none previously. Successful organizations get the best benefit from their SIM implementations when they establish their immediate SIM needs clearly, but have a clear vision for what they want SIM to deliver in the future</dc:description>
<dc:identifier>https://documentacion.fundacionmapfre.org/documentacion/publico/es/bib/103234.do</dc:identifier>
<dc:language>eng</dc:language>
<dc:publisher>Forrester Research</dc:publisher>
<dc:rights xml:lang="es">InC - http://rightsstatements.org/vocab/InC/1.0/</dc:rights>
<dc:subject xml:lang="es">Seguridad de la información</dc:subject>
<dc:subject xml:lang="es">Organizaciones</dc:subject>
<dc:subject xml:lang="es">Gestión de la información</dc:subject>
<dc:subject xml:lang="es">Seguridad informática</dc:subject>
<dc:type xml:lang="es">Libros</dc:type>
<dc:title xml:lang="es">Best practices : security information management</dc:title>
<dc:relation xml:lang="es">For Security & risk professionals</dc:relation>
</rdf:Description>
</rdf:RDF>