{"id":1551,"date":"2008-04-23T00:00:00","date_gmt":"2008-04-23T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/04\/23\/netwitness-integrates-with-enterprise-consoles\/"},"modified":"2021-12-30T11:39:35","modified_gmt":"2021-12-30T11:39:35","slug":"netwitness-integrates-with-enterprise-consoles","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/04\/23\/netwitness-integrates-with-enterprise-consoles\/","title":{"rendered":"NetWitness Integrates With Enterprise Consoles"},"content":{"rendered":"<p>SIEMLink provides the data that incident response and cyber threat analysis teams need to fuse security event telemetry with the detailed session analysis provided by NetWitness NextGen.   NetWitness NextGen customers can now greatly augment and empower any existing SIEM, intrusion detection or logging console, or enterprise network management system with zero integration effort.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;In order to effectively ensure security, organizations often need forensic evidence and detailed analytics beyond those provided by the alerts of IDS, ADS, and SIEM products,&#8221; said Michael Montecillo, Analyst with Enterprise Management Associates.<\/p>\n<p>&#8220;SIEMLink bridges the gap between high-level alerts and the information necessary to detect issues such as zero day attacks, designer malware and false positives.<\/p>\n<p>http:\/\/www.darkreading.com\/document.asp?doc_id=151709&#038;f_src=darkreading_section_297<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1551","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1551"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1551\/revisions"}],"predecessor-version":[{"id":4038,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1551\/revisions\/4038"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}