{"id":1554,"date":"2008-05-14T00:00:00","date_gmt":"2008-05-14T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/05\/14\/secureworks-revolutionizes-security-information-management-with-new-on-demand-service\/"},"modified":"2021-12-30T11:39:36","modified_gmt":"2021-12-30T11:39:36","slug":"secureworks-revolutionizes-security-information-management-with-new-on-demand-service","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/05\/14\/secureworks-revolutionizes-security-information-management-with-new-on-demand-service\/","title":{"rendered":"SecureWorks Revolutionizes Security Information Management with New, On-Demand Service"},"content":{"rendered":"<p>SecureWorks&#8217; new SIM On-Demand is a software-as-a-service (SaaS) offering that provides the first sustainable solution for collecting and analyzing logs and alerts from security devices and information assets in real time without having to install and manage SIM software or hardware.  Unlike traditional SIM product offerings, SecureWorks clients also have instant access to certified security experts at SecureWorks&#8217; Security Operations Center for 24x7x365 support should they have any questions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Having a SIM solution with no deployment headaches or infrastructure to manage gives organizations a valuable option that significantly improves security for their organization in an easy-to-use, efficient manner,&#8221; said Mike Cote, president &#038; CEO at SecureWorks.<\/p>\n<p>SIM On-Demand enables organizations to easily meet and exceed regulatory requirements for log monitoring and review.  SIM On-Demand also simplifies demonstrating compliance to board members, management and examiners with powerful, user-friendly reporting.<\/p>\n<p>http:\/\/www.secureworks.com\/media\/press_releases\/20080513-simondemand<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1554","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1554"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1554\/revisions"}],"predecessor-version":[{"id":4041,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1554\/revisions\/4041"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}