All resources sponsored by:

LogRhythm, Inc.

1 - 25 of 27 Matches
LogRhythm’s Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER:This brief guide explores one company's top-tier security intelligence platform and the essential security tools it provides.
Posted: 21 Apr 2014 | Published: 21 Apr 2014
Get This Now


Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER:This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 18 Apr 2014 | Published: 18 Apr 2014
Get This Now


Network Monitoring and your SIEM Solution
sponsored by LogRhythm, Inc.
WHITE PAPER:This informative guide provides insight into an effective network monitoring solution and how it can enhance your SIEM strategy.
Posted: 18 Apr 2014 | Published: 18 Apr 2014
Get This Now


The APT Lifecycle and its Log Trail
sponsored by LogRhythm, Inc.
WHITE PAPER:This guide explores the APT lifecycle and helps you understand the motives behind these attacks, making it easier to prevent them.
Posted: 17 Apr 2014 | Published: 31 Dec 2013
Get This Now


Advanced Intelligence (AI) EngineTM
sponsored by LogRhythm, Inc.
WHITE PAPER:This brief guide takes an in-depth look at one company's SIEM solution and how it employs log and event management to prevent cyber-attacks.
Posted: 17 Apr 2014 | Published: 17 Apr 2014
Get This Now


Scaling Analytics to Meet Real-Time Threats in Large Enterprises: A Deep Dive into LogRhythm’s Security Analytics Platform
sponsored by LogRhythm, Inc.
WHITE PAPER:Access this resource for in-depth information about the need for higher security information and event management (SIEM) capacity due to the increasing number of advanced persistent threats (APTs) organizations face.
Posted: 10 Oct 2013 | Published: 10 Oct 2013
Get This Now


The new era of big data security analytics
sponsored by LogRhythm, Inc.
EGUIDE:This expert guide examines the reasons why Big Data security is so important, providing helpful tips for adapting and utilizing it to your business' advantage.
Posted: 10 Oct 2013 | Published: 10 Oct 2013
Get This Now


Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER:Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more.
Posted: 05 Sep 2013 | Published: 29 Mar 2013
Get This Now


Key Considerations for Big Data Security Analytics SIEM 2.0
sponsored by LogRhythm, Inc.
WEBCAST:This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 05 Sep 2013 | Premiered: Feb 6, 2013
Get This Now


Vendor Landscape: Security Information & Event Management
sponsored by LogRhythm, Inc.
ANALYST REPORT:This white paper helps break down multiple security information and event management (SIEM) vendor details for your convenience and assistance in finding the right one for your business.
Posted: 04 Sep 2013 | Published: 04 Sep 2013
Get This Now


Tapping Big Data Security Analytics to Detect Breaches & Advanced Threats
sponsored by LogRhythm, Inc.
WEBCAST:This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012
Get This Now


Ease GLBA Compliance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER:Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process.
Posted: 04 Sep 2013 | Published: 31 Oct 2012
Get This Now


CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY:This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013
Get This Now


Security Intelligence: Ensure Compliance, Optimize Performance, Boost Security
sponsored by LogRhythm, Inc.
WEBCAST:Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization.
Posted: 03 Sep 2013 | Premiered: Sep 3, 2013
Get This Now


Big Data Intersection with Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST:This webcast explores the impact the looming intersection of big data and security analytics will have on your organization and explores why you should be looking forward to it.
Posted: 03 Sep 2013 | Premiered: Feb 28, 2013
Get This Now


Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
ANALYST REPORT:This Gartner Magic Quadrant on security information and event management (SIEM) systems reveals the strengths and cautions of 16 different vendors to help you find the system that best aligns with your business needs.
Posted: 03 Sep 2013 | Published: 07 May 2013
Get This Now


PCI and PA DSS Compliance Assurance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER:Gain insight into the six domains of Payment Card Industry Data Security Standard (PCI DSS) and its 12 control requirements and learn how a particular solution enables you to improve your overall security and compliance posture while simultaneously reducing associated costs.
Posted: 03 Sep 2013 | Published: 31 Oct 2012
Get This Now


Security Intelligence: A Review of LogRhythm's SIEM 2.0 Big Data Security Analytics Platform
sponsored by LogRhythm, Inc.
WHITE PAPER:This report reviews an analysis tool that can help simplify logging and event management, allowing you to more easily separate problems and key events from normal background activity – even in the face of Big Data. Read on now to learn more.
Posted: 04 Feb 2013 | Published: 31 Dec 2012
Get This Now


Security Intelligence: Can "Big Data" Analytics Overcome our Blind Spots?
sponsored by LogRhythm, Inc.
WHITE PAPER:Explore the current SIEM tools and capabilities today and uncover how new improvements in SIEM can help boost your defenses in today's threat-filled world.
Posted: 31 Jan 2013 | Published: 31 Dec 2012
Get This Now


SIEM Best Practices for Advanced Attack Detection
sponsored by LogRhythm, Inc.
EGUIDE:The industry has panned SIEM as an expensive and under performing technology. But to be clear, it's not a technology problem, it's a process issue. In this tech tip, Securosis analyst Mike Rothman will outline a time tested process to build SIEM policies which actually alert on the attacks you need to protect against.
Posted: 17 May 2013 | Published: 17 May 2013
Get This Now


Vendor Landscape: Security Information & Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER:This informative resource demonstrates how organizations can find a SIEM solution and achieve key goals. Other topics explained in this white paper include; understanding the capabilities of SIEM technologies and potential use cases.
Posted: 24 Jul 2012 | Published: 24 Jul 2012
Get This Now


Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER:Access this white paper for a comprehensive comparison of the leading security information and event management (SIEM) providers. Read on for an overview of the SIEM market and the vendor landscape to help you evaluate your options.
Posted: 19 Jul 2012 | Published: 19 Jul 2012
Get This Now


Keys to the Kingdom: Monitoring Privileged user actions for security and compliance
sponsored by LogRhythm, Inc.
WHITE PAPER:This paper examines some of the types of insider threats organizations face today and the role monitoring and managing privilege user actions plays in security and compliance reporting efforts.
Posted: 06 Mar 2012 | Published: 06 Mar 2012
Get This Now


LogRhythm and NERC
sponsored by LogRhythm, Inc.
WHITE PAPER:The NERC CIP Cyber Security Standards is intended to ensure the protection of the Critical Cyber Assets that control or effect the reliability of North America’s bulk electric systems. View this paper to explore how LogRhythm's NERC CIP Compliance package provides out-of-the box assistance in addressing numerous NERC CIP requirements.
Posted: 27 Feb 2012 | Published: 24 Feb 2012
Get This Now


LogRhythm 3-Minute Product Demo
sponsored by LogRhythm, Inc.
PRODUCT DEMO:This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
Posted: 09 Sep 2009 | Premiered: 09 Sep 2009
Get This Now


1 - 25 of 27 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement