All resources sponsored by:

Hexis Cyber Solutions Inc

23 Matches
Automated Removal of Advanced Threats: Defending Your Enterprise with Bob Gourley
sponsored by Hexis Cyber Solutions Inc
WEBCAST:This report from CTOvision introduces automated threat removal, an economical defense method that enables businesses to have an "invisible workforce" working around the clock to ward off attackers.
Posted: 14 Jul 2014 | Premiered: Jun 16, 2014
Get This Now


Hexis Webinar: Cyber Attack Strategies with Research Analyst Rick Holland
sponsored by Hexis Cyber Solutions Inc
WEBCAST:In this helpful webinar, Forrester research analyst Rick Holland helps you to reformulate a security strategy for your company that stands up against adversaries.
Posted: 07 Jul 2014 | Premiered: Jun 10, 2014
Get This Now


Technical Considerations for Selecting the Best Antimalware Technology
sponsored by Hexis Cyber Solutions Inc
EGUIDE:This informative e-guide discusses the evolution of malware and how today's antimalware products should handle detection and remediation.
Posted: 02 Jun 2014 | Published: 02 Jun 2014
Get This Now


A Community Approach to your Enterprise Security
sponsored by Hexis Cyber Solutions Inc
WEBCAST:This informative resource explores one company's solution and its unique community based approach to your enterprise security.
Posted: 28 May 2014 | Premiered: May 28, 2014
Get This Now


Advanced Persistent Threats: Detect, Engage and Remove
sponsored by Hexis Cyber Solutions Inc
WEBCAST:This informative resource explores a unique, next-generation strategy for thwarting APTs – focusing their attention on the behavior examination.
Posted: 28 May 2014 | Premiered: Oct 23, 2013
Get This Now


A Community Approach to your Enterprise Security
sponsored by Hexis Cyber Solutions Inc
WEBCAST:This informative resource explores one company's solution and its unique community based approach to your enterprise security.
Posted: 28 May 2014 | Premiered: May 28, 2014
Get This Now


HawkEye G-The Active Defense Grid
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER:This informative whitepaper takes a look at a unique security tool designed to prevent advanced persistent threats.
Posted: 27 May 2014 | Published: 27 May 2014
Get This Now


Advanced Persistent Threats: Detect, Engage and Remove
sponsored by Hexis Cyber Solutions Inc
WEBCAST:This informative resource explores a unique, next-generation strategy for thwarting APTs – focusing their attention on the behavior examination.
Posted: 27 May 2014 | Premiered: May 27, 2014
Get This Now


Data Breach Detection and Response
sponsored by Hexis Cyber Solutions Inc
WEBCAST:This informative resource explores the changes in data breaches and outlines a strategy for incident response.
Posted: 22 May 2014 | Premiered: May 22, 2014
Get This Now


Five Things To Do After You've Been Hacked
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER:Access this informative guide to find out 5 things to do after you've been hacked – keeping your system safe and secure.
Posted: 22 May 2014 | Published: 22 May 2014
Get This Now


Five Things To Do After An Attack
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER:Advanced persistent threats are a top priority for many IT departments – as they should be. Access this informative whitepaper and find out 5 things to do after a potential attack.
Posted: 22 May 2014 | Published: 22 May 2014
Get This Now


Overcoming Today's Compliance and Security Data-Related Challenges
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER:This informative whitepaper explores a unique strategy for overcoming today's compliance and security data-related challenges.
Posted: 21 May 2014 | Published: 21 May 2014
Get This Now


Defending Against APTs: Do You Have the Complete Picture?
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER:Uncover the ins and outs of APTs and learn why current defenses lack the ability to protect your organization. In addition, learn about a pioneering security management approach that provides the features you need to combat these troublesome threats.
Posted: 17 Jul 2013 | Published: 17 Jul 2013
Get This Now


Security Policies for Next-Generation IT
sponsored by Hexis Cyber Solutions Inc
EBOOK:This CIO Decisions e-zine focuses on effective BYOD security policy. Inside, learn why security threats are evolving faster than the management practices that defend against them and, more importantly, how you can stay ahead.
Posted: 28 Jun 2013 | Published: 31 Oct 2012
Get This Now


Sharing Security Intelligence: How to Build a Strong Network
sponsored by Hexis Cyber Solutions Inc
EGUIDE:This expert e-guide from SearchSecurity.com explores how joining and creating strong security networks within which you share security intelligence data are crucial to avoiding security incidents and remaining secure.
Posted: 18 Jun 2013 | Published: 18 Jun 2013
Get This Now


Big Data Security Analytics: Harnessing New Tools for Better Security
sponsored by Hexis Cyber Solutions Inc
EBOOK:New techniques are emerging to help organizations analyze security data and improve security defenses.
Posted: 18 Jun 2013 | Published: 18 Jun 2013
Get This Now


The Event Data Warehouse- Strategies for Improving Business Performance
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER:Organizations are at risk if they do not plan to implement an enterprise-wide security and event data warehouse to make strategic decisions. This paper introduces Event Data Warehouse, a unique, cost effective and proven solution, that provides actionable results that enable better business decisions.
Posted: 18 Jul 2011 | Published: 18 Jul 2011
Get This Now


SenSage Security Intelligence
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER:This white paper will teach you about a solution that can provide you with enterprise-wide protection and also provide you with decision support when it comes to security, risk management and compliance. So don't waste anytime and see why this real-time security solution could save your enterprise from a costly security breach.
Posted: 02 Jun 2011 | Published: 01 Feb 2010
Get This Now


Database Auditing Tools and Strategies
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER:This paper is to introduce the current options available for database auditing and trade-offs using each.
Posted: 10 Nov 2008 | Published: 30 Oct 2008
Get This Now


SenSage Event Data Warehouse
sponsored by Hexis Cyber Solutions Inc
PRODUCT LITERATURE:This document explains how SenSage advantage meets key compliance requirements in PCI, HIPAA, SOX, NISPOM, FISMA, DCID and more.
Posted: 01 Aug 2008 | Published: 01 Aug 2008
Get This Now


Event Data Warehousing
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER:This white paper describes that data warehousing should not necessarily be the basis upon which companies retain and query historic data for prolonged periods.
Posted: 01 Aug 2008 | Published: 01 Feb 2008
Get This Now


Achieving PCI Compliance with Log Management
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER:This white paper will review what is specifically called for in PCI DSS Requirement 10, explore the technical considerations of the requirement, and consider some different approaches to addressing the requirement.
Posted: 17 Jul 2008 | Published: 16 Jul 2008
Get This Now


Correlating SIM Information to Detect Insider Threats
sponsored by Hexis Cyber Solutions Inc
WEBCAST:This Webcast details how to use the power of SIM information gathering and correlation to detect patterns of behavior indicative of insider misuse or attack.
Posted: 13 Jul 2007 | Premiered: Jun 18, 2007, 13:00 EDT (17:00 GMT)
Get This Now


23 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement