My Account Log in

2 options

Building a Next-Gen SOC with IBM QRadar : accelerate your security operations and detect cyber threats effectively / Ashish M. Kothekar and Sandeep Patil.

Ebook Central College Complete Available online

View online

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Kothekar, Ashish M., author.
Patil, Sandeep, author.
Language:
English
Subjects (All):
Computer networks--Security measures.
Computer networks.
Computer security.
Physical Description:
1 online resource (198 pages)
Edition:
1st ed.
Place of Publication:
Birmingham, England : Packt Publishing Ltd., [2023]
Biography/History:
Kothekar Ashish: Ashish has a total experience of more than 15 years working for IBM on various different platforms. He is currently working as tech evangelist for IBM Security products. He has been instrumental in developing more than 10 IBM certification exams including IBM products like QRadar, Cloud Pak for Security, IBM SiteProtector, IBM XGS, etc. He has worked with multiple customers on deploying and then upgrading IBM security products. He has contributed regularly by writing blogs and giving talks on security products. He has published many redpapers on the integration of security products with IBM Storage solutions like IBM Spectrum scale. These redpapers are now full-fledged solutions that are being sold. He has also cleared two Mandarin language exams and is HSK2 qualified.
Summary:
Are you looking for a QRadar guide that can help you to build a very efficient SOC for Threat Hunting, need-to-know software updates, or understanding compliance and reporting? Then this one-stop guide will help you to understand everything about IBM QRadar, and how it stores network data in real-time. This book will start with a quick introduction to QRadar components and architecture, and you will learn different ways to deploy the QRadar.
Contents:
Table of ContentsQRadar ComponentsHow QRadar Components Fit TogetherManaging QRadar DeploymentsIntegrating Logs and Flows in QRadarLeaving No Data BehindQRadar SearchesQRadar Rules and OffensesThe Insider Threat
Detection and MitigationIntegrating AI into Threat ManagementRe-Designing User ExperienceWinCollect
the Agent for WindowsTroubleshooting QRadar.
Notes:
Includes bibliographical references and index.
Description based on print version record.
ISBN:
9781801079181
1801079188
OCLC:
1381742630

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account