skip to Main Content
Log In | Register
TwitterFacebookLinkedIn
Bloor Research
  • Why Bloor?
    • About Us
    • Our Customers
    • Research Methodology
    • Join The Team
    • People at Bloor
  • Services
    • Research and Analysis
    • Bloor Navigators
    • Vendor Support
  • Mutable
  • Expertise
    • Infrastructure
      • Cloud
      • Cloud Management
      • Edge Computing
      • Mainframe 3.0
    • Data
      • Data in Motion
      • Data at Rest
      • Data as an Asset
      • Data Discovery and Catalogues
      • Data Fabric
      • Data Governance
      • Data Integration
      • Data Quality
      • Data Warehousing
      • Graph Databases
      • MDM
      • Spreadsheet Governance
      • Streaming Analytics Platforms
    • Action
      • AI
      • Analytics
      • Application Assurance
      • Data Masking
      • Outcome Automation
      • Right Insight
      • Test Data Management
      • Test Design Automation
    • Trust
      • Data Security
      • GRC
      • Identity and Trust
      • Threat Detection and Response
  • Research
    • Research Library
    • Vendor Database
  • Analysts
  • Contact
    • Briefing Request
    • Mailing List
Open Mobile Menu

Security analytics (Technology-Value)

Home » Security analytics (Technology-Value)

The role of trusted data in security intelligence

  • 13th February 2015
  • Fran Howarth
To gain actionable insight from data you must be able to trust the data in the first place.

SolarWinds sets its sights on Big Four networking giants

  • 20th September 2013
  • Peter Williams
Peter Williams reviews the IT management company's progress six years on

The requirements of a security analytics platform

  • 2nd May 2013
  • Fran Howarth
Providing the visibility needed to make better informed decisions and reduce overall risk

The value of big data in security

  • 24th December 2012
  • Fran Howarth
One of today's buzzwords is big data. Volumes of information generated are increasing rapidly, driven in part by increased take up of mobile...

Collaborative SIEM solutions

  • 15th April 2011
  • Philip Howard
Combining SIEM products from different vendors may make sense
About Bloor

Bloor is an independent research and analyst house focused on the idea that Evolution is Essential to business success and ultimately survival. For nearly 30 years we have enabled businesses to understand the potential offered by technology and choose the optimal solutions for their needs.

Useful Links
  • Bloor Mailing List
  • Request an Analyst Briefing
  • Bloor Navigators
  • Site Map
  • Terms & Conditions
  • Privacy & Cookie Policy
Copyright © Bloor 2025. All Rights Reserved.
  • Why Bloor?
    • Our Customers
    • Research Methodology
    • Join The Team
    • People at Bloor
  • Services
    • Research and Analysis
    • Bloor Navigators
    • Vendor Support
  • Mutable Business™ Explained
  • Expertise
  • Research
    • Research Library
    • Vendor Database
  • Analysts
  • Request an Analyst Briefing
  • Bloor Mailing List
  • Contact
Back To Top
We use third-party cookies, including Google Analytics, to ensure that we give you the best possible experience on our website.I AcceptNo, thanksRead our Privacy Policy