All resources sponsored by:

Hexis Cyber Solutions Inc

12 Matches
Defending Against APTs: Do You Have the Complete Picture?
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER:Uncover the ins and outs of APTs and learn why current defenses lack the ability to protect your organization. In addition, learn about a pioneering security management approach that provides the features you need to combat these troublesome threats.
Posted: 17 Jul 2013 | Published: 17 Jul 2013
Get This Now


Security Policies for Next-Generation IT
sponsored by Hexis Cyber Solutions Inc
EBOOK:This CIO Decisions e-zine focuses on effective BYOD security policy. Inside, learn why security threats are evolving faster than the management practices that defend against them and, more importantly, how you can stay ahead.
Posted: 28 Jun 2013 | Published: 31 Oct 2012
Get This Now


Sharing Security Intelligence: How to Build a Strong Network
sponsored by Hexis Cyber Solutions Inc
EGUIDE:This expert e-guide from SearchSecurity.com explores how joining and creating strong security networks within which you share security intelligence data are crucial to avoiding security incidents and remaining secure.
Posted: 18 Jun 2013 | Published: 18 Jun 2013
Get This Now


Big Data Security Analytics: Harnessing New Tools for Better Security
sponsored by Hexis Cyber Solutions Inc
EBOOK:New techniques are emerging to help organizations analyze security data and improve security defenses.
Posted: 18 Jun 2013 | Published: 18 Jun 2013
Get This Now


Effective Ways to Search Log Files
sponsored by Hexis Cyber Solutions Inc
EGUIDE:Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.
Posted: 05 Apr 2012 | Published: 05 Apr 2012
Get This Now


The Event Data Warehouse- Strategies for Improving Business Performance
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER:Organizations are at risk if they do not plan to implement an enterprise-wide security and event data warehouse to make strategic decisions. This paper introduces Event Data Warehouse, a unique, cost effective and proven solution, that provides actionable results that enable better business decisions.
Posted: 18 Jul 2011 | Published: 18 Jul 2011
Get This Now


SenSage Security Intelligence
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER:This white paper will teach you about a solution that can provide you with enterprise-wide protection and also provide you with decision support when it comes to security, risk management and compliance. So don't waste anytime and see why this real-time security solution could save your enterprise from a costly security breach.
Posted: 02 Jun 2011 | Published: 01 Feb 2010
Get This Now


Database Auditing Tools and Strategies
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER:This paper is to introduce the current options available for database auditing and trade-offs using each.
Posted: 10 Nov 2008 | Published: 30 Oct 2008
Get This Now


Event Data Warehousing
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER:This white paper describes that data warehousing should not necessarily be the basis upon which companies retain and query historic data for prolonged periods.
Posted: 01 Aug 2008 | Published: 01 Feb 2008
Get This Now


SenSage Event Data Warehouse
sponsored by Hexis Cyber Solutions Inc
PRODUCT LITERATURE:This document explains how SenSage advantage meets key compliance requirements in PCI, HIPAA, SOX, NISPOM, FISMA, DCID and more.
Posted: 01 Aug 2008 | Published: 01 Aug 2008
Get This Now


Achieving PCI Compliance with Log Management
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER:This white paper will review what is specifically called for in PCI DSS Requirement 10, explore the technical considerations of the requirement, and consider some different approaches to addressing the requirement.
Posted: 17 Jul 2008 | Published: 16 Jul 2008
Get This Now


Correlating SIM Information to Detect Insider Threats
sponsored by Hexis Cyber Solutions Inc
WEBCAST:This Webcast details how to use the power of SIM information gathering and correlation to detect patterns of behavior indicative of insider misuse or attack.
Posted: 13 Jul 2007 | Premiered: Jun 18, 2007, 13:00 EDT (17:00 GMT)
Get This Now


12 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement