All resources sponsored by:

LogRhythm, Inc.

25 Matches
Employing Machine Learning in a Security Environment
sponsored by LogRhythm, Inc.
WHITE PAPER:As security vendors look for ways to improve their security posture and fight against advancing cyberattacks, there has been a great deal of interest in machine learning and AI. This white paper offers insight into applying machine learning and AI to your current security environment to improve your ability to swiftly detect and respond to threats.
Posted: 09 Jan 2018 | Published: 09 Jan 2018
Get This Now


How to Build a Soc with Limited Resources
sponsored by LogRhythm, Inc.
WHITE PAPER:Having a security operations center (SOC) has become an absolute necessity for implementing threat lifecycle management to minimize damage caused by successful attacks. This white paper offers a guide to building an SOC with limited resources and provides the basics of the cyberattack lifecycle through the threat lifecycle management framework.
Posted: 09 Jan 2018 | Published: 09 Jan 2018
Get This Now


Logrythm's Security Analytics Platform: Product Overview
sponsored by LogRhythm, Inc.
EGUIDE:In this e-guide, expert Dan Sullivan examines LogRhythm's Security Analytics Platform, a tool that leverages big data analytics and machine learning to help protect enterprises. Learn how this platform works, as well as insights on its support, cost, and deployment.
Posted: 20 Sep 2017 | Published: 14 Sep 2017
Get This Now


SIEM Analysis for Security Professionals
sponsored by LogRhythm, Inc.
EDITORIAL RESOURCE GUIDE:This expert e-guide explores why it's important that SIEM systems have an analysis interface for security professionals, as well as how advanced security analytics can safeguard your enterprise.
Posted: 20 Sep 2017 | Published: 14 Sep 2017
Get This Now


The Future of Security: Advanced Security Analytics
sponsored by LogRhythm, Inc.
EGUIDE:As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.
Posted: 23 Nov 2016 | Published: 22 Nov 2016
Get This Now


Basic SIEM Analytics Steps to Know
sponsored by LogRhythm, Inc.
EGUIDE:This e-guide outlines a beginning for your SIEM implementation strategy. By breaking down SIEM analytics into steps, you can provide your enterprise with improved security management.
Posted: 22 Nov 2016 | Published: 22 Nov 2016
Get This Now


LogRhythm's Security Analytics Platform: Product Overview
sponsored by LogRhythm, Inc.
EGUIDE:In this expert e-guide, uncover an artificial intelligence engine that takes security to a completely different level than ever before. Uncover how to leverage big data technologies to help mitigate the risk of targeted, persistent threats.
Posted: 22 Nov 2016 | Published: 22 Nov 2016
Get This Now


Adjusting a Continuous Monitoring Strategy to a Hybrid Era
sponsored by LogRhythm, Inc.
EGUIDE:Your monitoring strategy is vital to keeping networks and data secure. Access this e-guide for IT security veteran Dave Shackleford's latest tips on how to factor the hybrid cloud variable into the security equation, particularly when it comes to aligning with the U.S. Department of Homeland Security Continuous Diagnostics and Mitigation framework.
Posted: 18 Nov 2016 | Published: 16 Nov 2016
Get This Now


SIEM Analysis Interfaces for Security Professionals
sponsored by LogRhythm, Inc.
EGUIDE:This expert e-guide explains how you can avoid SIEM errors by implementing an analysis interface in your SIEM system to ease assessment and interpretation tasks for security professionals.
Posted: 18 Nov 2016 | Published: 16 Nov 2016
Get This Now


Basic SIEM Analytics Steps to Know
sponsored by LogRhythm, Inc.
EGUIDE:All SIEM products provide basic data analytics capabilities, but you may be able to improve the effectiveness and efficiency of these capabilities through some relatively small changes. Learn three fundamental steps to take that will help you get the most out of your security information and event management tool.
Posted: 16 Nov 2016 | Published: 16 Nov 2016
Get This Now


Discover SIEM Capabilities For Real-Time Analysis
sponsored by LogRhythm, Inc.
EGUIDE:In this expert e-guide, learn what 3 SIEM capabilities aid the real-time analysis of collected information and security alarms, allowing for prompt detection of actual or potential attacks.
Posted: 16 Nov 2016 | Published: 16 Nov 2016
Get This Now


Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER:The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014
Get This Now


How to Use Threat Intelligence with SIEM Products
sponsored by LogRhythm, Inc.
EGUIDE:This expert e-guide will teach you how to use security information and event management to protect your organization from evolving threats.
Posted: 24 Nov 2014 | Published: 24 Nov 2014
Get This Now


Detecting and Preventing Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER:Continue on to this important whitepaper now to learn how to properly instrument and monitor for anomalous activity. Also discover a security intelligence platform that can directly monitor endpoints and much more.
Posted: 30 Apr 2014 | Published: 30 Apr 2014
Get This Now


Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER:This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 18 Apr 2014 | Published: 18 Apr 2014
Get This Now


Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST:This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012
Get This Now


CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY:This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013
Get This Now


Preventing Cyber-Attacks with Big Data Security Analytics and SIEM
sponsored by LogRhythm, Inc.
WEBCAST:This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 03 Sep 2013 | Premiered: Feb 6, 2013
Get This Now


Vendor Landscape: Security Information & Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER:This informative resource demonstrates how organizations can find a SIEM solution and achieve key goals. Other topics explained in this white paper include; understanding the capabilities of SIEM technologies and potential use cases.
Posted: 24 Jul 2012 | Published: 24 Jul 2012
Get This Now


Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER:Access this white paper for a comprehensive comparison of the leading security information and event management (SIEM) providers. Read on for an overview of the SIEM market and the vendor landscape to help you evaluate your options.
Posted: 19 Jul 2012 | Published: 19 Jul 2012
Get This Now


Keys to the Kingdom: Monitoring Privileged user actions for security and compliance
sponsored by LogRhythm, Inc.
WHITE PAPER:This paper examines some of the types of insider threats organizations face today and the role monitoring and managing privilege user actions plays in security and compliance reporting efforts.
Posted: 06 Mar 2012 | Published: 06 Mar 2012
Get This Now


LogRhythm and NERC
sponsored by LogRhythm, Inc.
WHITE PAPER:The NERC CIP Cyber Security Standards is intended to ensure the protection of the Critical Cyber Assets that control or effect the reliability of North America’s bulk electric systems. View this paper to explore how LogRhythm's NERC CIP Compliance package provides out-of-the box assistance in addressing numerous NERC CIP requirements.
Posted: 27 Feb 2012 | Published: 24 Feb 2012
Get This Now


LogRhythm 3-Minute Product Demo
sponsored by LogRhythm, Inc.
PRODUCT DEMO:This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
Posted: 09 Sep 2009 | Premiered: 09 Sep 2009
Get This Now


LogRhythm and PCI Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER:LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs. This paper illustrates and discusses the 6 domains of PCI DSS requirements as well as uses tables to outline how LogRhythm supports PCI compliance.
Posted: 09 Sep 2009 | Published: 09 Sep 2009
Get This Now


LogRhythm and NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER:LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs, it automatically performs the first level of log analysis and also ensures you to meet your reporting requirements.
Posted: 25 Jul 2008 | Published: 01 Jul 2008
Get This Now


25 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement