All resources sponsored by:

LogRhythm, Inc.

1 - 25 of 44 Matches
Detecting Data Exfiltration
sponsored by LogRhythm, Inc.
VIDEO:Watch this webcast and learn how you can rapidly detect, respond and neutralize breaches in your networks before they cause serious damage.
Posted: 19 Jan 2016 | Premiered: 03 Aug 2015
Get This Now


Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WEBCAST:In this webcast, experts will discuss today's rapidly evolving cyber threat landscape and offer solutions to detect incursions early so your company can respond quickly and avoid loss.
Posted: 18 Jan 2016 | Premiered: Mar 19, 2015
Get This Now


8 Reasons why Users are Rethinking their SIEM Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER:This brief yet informative infographic highlights eight reasons why having the right SIEM approach is critical to productivity, compliance and ROI. Read on to determine if your current SIEM practices are doing the most for your network security.
Posted: 11 Jan 2016 | Published: 11 Jan 2016
Get This Now


Network Security Monitoring Tools and Continuous Monitoring
sponsored by LogRhythm, Inc.
EGUIDE:This expert e-guide demonstrates why organizations need to rethink their network security tools, monitoring, and threat intelligence to eliminate vulnerabilities.
Posted: 21 Dec 2015 | Published: 16 Dec 2015
Get This Now


Advances and Benefits of SIEM Products
sponsored by LogRhythm, Inc.
EGUIDE:In this expert e-guide, learn the latest SIEM system advances to help mitigate malicious attacks as well as 3 additional benefits enterprises can enjoy from implementing an SIEM strategy.
Posted: 18 Dec 2015 | Published: 09 Dec 2015
Get This Now


Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER:Access this magic quadrant to learn how vendors are updating SIEM technologies for growing threat prevention needs, and how they can help you.
Posted: 12 Nov 2015 | Published: 20 Jul 2015
Get This Now


Critical Capabilities for Security Information and Event Management (SIEM)
sponsored by LogRhythm, Inc.
WHITE PAPER:Access this report for insight on aligning IT's needs with three key use cases to choose the best SIEM solution for the organization.
Posted: 12 Nov 2015 | Published: 21 Sep 2015
Get This Now


Anatomy of A Hack Disrupted
sponsored by LogRhythm, Inc.
WHITE PAPER:This white paper takes a close-up look one successfully mitigated malware attack, giving you insight on how to stop a potential cyber-breach.
Posted: 28 Oct 2015 | Published: 28 Oct 2015
Get This Now


Critical Capabilities Use Cases for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER:This vendor comparison reviews SIEM performance by three different use cases, showing you which SIEM platform works best for your business needs.
Posted: 27 Oct 2015 | Published: 21 Sep 2015
Get This Now


10 SIEM Platforms Tested for Security Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER:This report looks at ten different SIEM products and analyzes which one performs best when it comes to security event management.
Posted: 05 Aug 2015 | Published: 05 Aug 2015
Get This Now


Special Report: 10 SIEM Technologies Reviewed
sponsored by LogRhythm, Inc.
WHITE PAPER:This report analyzes ten different SIEM technologies for risk management, threat detection, and performance.
Posted: 05 Aug 2015 | Published: 05 Aug 2015
Get This Now


Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER:The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014
Get This Now


Cybersecurity Overview for CEOs and Boards
sponsored by LogRhythm, Inc.
WHITE PAPER:This valuable white paper gives detailed information about the security risks CEOs face and what they can do to ensure that their enterprise is being taken care of.
Posted: 09 Feb 2015 | Published: 09 Feb 2015
Get This Now


A Proven Security Intelligence Model for Combating Cyber Threats
sponsored by LogRhythm, Inc.
WHITE PAPER:Access this informative white paper to find out what cyber threats are emerging as key players and what you can do to stop them.
Posted: 06 Feb 2015 | Published: 06 Feb 2015
Get This Now


Ensuring Compliance and Security in the Enterprise
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT:Tune into this video to find an in-depth, indexed demonstration of an award-winning security intelligence platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014
Get This Now


How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST:Access this webcast to discover how a credit union found the SIEM that met all of its security needs, and to learn how you can follow the same process for your SIEM selection.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014
Get This Now


Mobilizing Security Intelligence: LogRhythm's UX for Web and Tablet
sponsored by LogRhythm, Inc.
VIDEO:In this video, Seth Goldhammer, Director of Product Management, tours and showcases LogRhythm's new User Experience (UX) for Web and Tablet.
Posted: 31 Jul 2014 | Premiered: 21 Feb 2014
Get This Now


Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO:In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014
Get This Now


The Top 20 Critical Security Controls for Effective Cyber Defense
sponsored by LogRhythm, Inc.
WHITE PAPER:This paper outlines how LogRhythm's Security Intelligence Platform maps directly to each of the 20 Critical Security Controls, developed by the SANS Institute to help prioritize the most effective methods and policies to safeguard assets, information, and infrastructure.
Posted: 31 Jul 2014 | Published: 31 Jan 2014
Get This Now


Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER:This white paper describes the capabilities of LogRhythm's automation suite for NERC CIP compliance, which helps organizations improve their overall security and compliance posture while reducing costs.
Posted: 31 Jul 2014 | Published: 29 Jul 2014
Get This Now


LogRhythm's Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER:This white paper describes LogRhythm's Security Intelligence Platform, which combines enterprise-class SIEM, Log Management, File Integrity Monitoring, and Machine Analytics with Host and Network Forensics to provide profound visibility into threats and risks to which organizations are otherwise blind.
Posted: 31 Jul 2014 | Published: 29 Jul 2014
Get This Now


Identity Analytics: Exposing the "Who" in Anonymous Log and Machine Data
sponsored by LogRhythm, Inc.
WHITE PAPER:This white paper describes how you can combine your machine data with advanced analytics to automatically identify the "who" behind otherwise anonymous data.
Posted: 31 Jul 2014 | Published: 29 Jul 2014
Get This Now


LogRhythm Labs Embedded Expertise
sponsored by LogRhythm, Inc.
WHITE PAPER:This white paper describes LogRhythm Labs, an organization within LogRhythm that performs dedicated research to continually enhance the Security Intelligence Platform with embedded machine data intelligence, real-time threat detection, and automated compliance assurance.
Posted: 31 Jul 2014 | Published: 29 Jul 2014
Get This Now


Scaling Analytics to Meet Real-Time Threats in Large Enterprises
sponsored by LogRhythm, Inc.
WHITE PAPER:This white paper summarizes a comprehensive validation lab test recently performed by the SANS Institute on LogRhythm's security analytics platform.
Posted: 31 Jul 2014 | Published: 30 Sep 2013
Get This Now


How to Use Threat Intelligence with SIEM Products
sponsored by LogRhythm, Inc.
EGUIDE:This expert e-guide will teach you how to use security information and event management to protect your organization from evolving threats.
Posted: 24 Nov 2014 | Published: 24 Nov 2014
Get This Now


1 - 25 of 44 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement