{"id":1570,"date":"2008-10-15T00:00:00","date_gmt":"2008-10-15T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/10\/15\/fidelis-security-systems-releases-next-generation-of-extrusion-enhanced-reporting-alert-management\/"},"modified":"2021-12-30T11:39:38","modified_gmt":"2021-12-30T11:39:38","slug":"fidelis-security-systems-releases-next-generation-of-extrusion-enhanced-reporting-alert-management","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/10\/15\/fidelis-security-systems-releases-next-generation-of-extrusion-enhanced-reporting-alert-management\/","title":{"rendered":"Fidelis Security Systems Releases Next Generation of Extrusion Enhanced Reporting &#038; Alert Management"},"content":{"rendered":"<p>Fidelis Security Systems, the leader in next-generation data leakage prevention (DLP) solutions, today released the latest version of the award-winning Fidelis Extrusion Prevention System(R), Fidelis XPS(TM).  The integration of Fidelis XPS with the ArcSight Security Information and Event Management (SIEM) Platform via Common Event Format (CEF), coupled with enhancements to the Fidelis XPS reporting and alert management functions, gives customers powerful new tools to track and analyze information security policy violations and to correlate that visibility into related events or trends.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;By bringing together these two best-of-breed technologies, customers can dramatically improve their awareness of and response to security incidents,&#8221; said Jeff Scheel, senior vice president of business development, ArcSight.<\/p>\n<p>The newly released version of Fidelis XPS also includes enhancements to reporting and alert management capabilities, enabling business and technical users alike to manage and analyze alert information and trends through the redesigned workflow including incident handling and forensics analysis.  &#8220;By utilizing these two best-of-breed technologies with the ability to share technical alerts and vital information from end-to-end, an organization can realize the value and full potential of maximum risk reduction in their data security investments.&#8221;<\/p>\n<p>http:\/\/software.einnews.com\/article.php?nid=6924<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1570","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1570"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1570\/revisions"}],"predecessor-version":[{"id":4057,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1570\/revisions\/4057"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}