Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
SANTA CLARA, CA -- (Marketwire) -- 10/24/12 -- AccelOps, Inc., a pioneering developer of software that integrates security (SIEM), performance and availability monitoring into a single easy-to-use application, today announced that it will enable enterprises to provide employees with secure access to corporate networks and data using Apple's new iPad mini. AccelOps' new and unique geo-location feature enables IT organizations to ensure that Bring Your Own Devices (BYOD) are allowed access only from authorized locations, reducing the security and compliance risks associated with device theft and improper access.
"Mobile computing and BYOD are a reality in today's progressive IT infrastructures," said Elie Antoun, President and CEO at AccelOps. "Our customers choose AccelOps because we provide a real time 'single pane of glass' view of security, performance, and availability information from almost any source across the data center infrastructure, regardless of whether it's physical, virtual, or in the cloud. That's why we added advanced geo-location meta-data to rapidly support any new devices that connect to the infrastructure, like the iPad mini."
AccelOps has developed the first software application that delivers Security Information and Event Management (SIEM) and monitors performance and availability of IT infrastructure and applications on a single platform. Using patented real-time analytics technology, AccelOps cross-correlates log and event data, in real time, to make sense of complex IT patterns and events as they occur. This holistic approach reduces operational security and compliance risk by eliminating the blind spots and high costs of deploying multiple, single-function tools to monitor and correlate data across discrete silos of IT functionality.
AccelOps simplifies IT monitoring tasks by adding contextual intelligence, such as appending every device log and event with geo-location information including city, state, country, latitude and longitude. Events may be displayed on a world map and rules may be created that include geographical context. For example, AccelOps can alert IT if a mobile device logs into the corporate network from a location where the company does not do business, and trigger a script to automatically disconnect the device from the network, thereby avoiding potential security breaches.
Additional information, price quotes, white papers, a BYOD solution brief, and a recorded webinar on Monitoring Strategies in Today's BYOD World are available online at www.accelops.com.
About AccelOps
AccelOps provides a new generation of integrated security, performance and availability monitoring software for today's dynamic, virtualized data centers. Based on patented distributed real-time analytics technology, AccelOps automatically analyzes and makes sense of behavior patterns spanning server, storage, network, security, users, and applications to rapidly detect and resolve problems. AccelOps works across traditional data centers as well as private and hybrid clouds. The software-only application runs on a VMware ESX or ESXi virtual appliance and scales seamlessly by adding additional VMs to a cluster. Its unmatched delivery of real-time, proactive security and operational intelligence allows organizations to be more responsive and competitive as they expand the IT capabilities that underpin their business. For more information, visit www.accelops.com.
AccelOps and the AccelOps logo are trademarks of AccelOps, Inc., a privately held Delaware corporation. Other names mentioned may be trademarks and properties of their respective owners.
Add to Digg Bookmark with del.icio.us Add to Newsvine
Media Contacts:
Agnes Lamont
Marketingsage
Email Contact
(925) 426-0488 X112
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs