All resources sponsored by:

LogRhythm, Inc.

1 - 25 of 56 Matches
How Ransomware Works
sponsored by LogRhythm, Inc.
RESOURCE:Explore what ransomeware is, and the 5 stages of a ransomware attack so that you can prepare for the reality of this growing threat.
Posted: 13 May 2016 | Published: 13 May 2016
Get This Now


The Ransomware Threat - A Guide to Detecting an Attack Before it's Too Late
sponsored by LogRhythm, Inc.
WHITE PAPER:Learn all about ransomware in this white paper, including the 5 phases of a ransomware attack and the 5 steps of defending against one, including: prepare with various security measures, focus on detection, be ready for containment, and 2 more.
Posted: 13 May 2016 | Published: 13 May 2016
Get This Now


How to Raise your Organization's Security Maturity Level
sponsored by LogRhythm, Inc.
WHITE PAPER:This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.
Posted: 01 Apr 2016 | Published: 01 Apr 2016
Get This Now


Security Architecture Review: Reducing Detection and Response Times
sponsored by LogRhythm, Inc.
WHITE PAPER:This white paper showcases how to provide greater visibility across the ever-expanding attack surface and apply big data analytics to detect patterns of concerning behavior faster.
Posted: 08 Mar 2016 | Published: 16 Dec 2015
Get This Now


2016 Cyberthreat Defense Report
sponsored by LogRhythm, Inc.
WHITE PAPER:This 36-page report reveals the results from 1,000 IT security pros primary concerns about existing cybersecurity threats, defense strategies, and whether investing more in IT improves your chances of securing your organization against these threats.
Posted: 07 Mar 2016 | Published: 02 Mar 2016
Get This Now


Cyberthreat Intelligence: How Organizations are Using Analytics on Data Left Behind by Hackers
sponsored by LogRhythm, Inc.
WHITE PAPER:One barrier to understanding the merits of cyberthreat intelligence (CTI) is confusion about what it is and what it isn't. Access this article to gain an insider's perspective on what CTI really has to offer, who needs it, and how to find the right vendor.
Posted: 07 Mar 2016 | Published: 07 Mar 2016
Get This Now


Windows Security Management: What's New in Windows 10
sponsored by LogRhythm, Inc.
WHITE PAPER:In this white paper, you'll explore how new auditing and logging capabilities in Windows 10 give IT visibility into potential threats. Uncover ways to thwart threat actors by scoping user privileges, logging on with additional credentials, and more.
Posted: 07 Mar 2016 | Published: 29 Jan 2016
Get This Now


What’s New in the Windows 10 Security Log
sponsored by LogRhythm, Inc.
WHITE PAPER:In this white paper, take a look at the new and updated event entries in Windows 10 and learn how to leverage them to identify malicious activity. Continue reading to uncover the specific auditing and logging events recently added by Microsoft and how to turn data into insights.
Posted: 07 Mar 2016 | Published: 27 Jan 2016
Get This Now


2016 Cyber-Threat Defense Report
sponsored by LogRhythm, Inc.
WHITE PAPER:This report illuminates ways to reduce your attack surface using next-generation firewalls and CASBs, so you can control access to network and cloud-based computing resources. Access now to examine other tools and tactics, including network access control, full-network scans, and more.
Posted: 04 Mar 2016 | Published: 04 Mar 2016
Get This Now


An Integrated Approach to Reducing Detection and Response Times
sponsored by LogRhythm, Inc.
WHITE PAPER:Access this white paper to learn about an integrated set of tools that provide a holistic view across the ever-expanding attack surface, and apply big data analytics to detect patterns of concerning behavior faster.
Posted: 03 Mar 2016 | Published: 03 Mar 2016
Get This Now


E-book: Cyberthreat Intelligence
sponsored by LogRhythm, Inc.
EBOOK:This e-book shows you how you can identify high-impact threats and how to neutralize them before you're breached.
Posted: 02 Mar 2016 | Published: 29 Feb 2016
Get This Now


Scaling big data analytics
sponsored by LogRhythm, Inc.
VIDEO:This video shows you how to reduce to the time to detect and respond to threats as they come through your network. Find out how you can use machine-driven, real-time behavioral analytics, rapid forensic search and automated response to keep your network safe.
Posted: 01 Mar 2016 | Premiered: 21 Dec 2015
Get This Now


Neutralization of a Phishing Attack
sponsored by LogRhythm, Inc.
VIDEO:This video shows you a solution for faster detection and response. Gain unified security intelligence and analytics and end to end threat lifecycle management through this read.
Posted: 01 Mar 2016 | Premiered: 22 Feb 2016
Get This Now


Detecting Data Exfiltration
sponsored by LogRhythm, Inc.
VIDEO:Watch this webcast and learn how you can rapidly detect, respond and neutralize breaches in your networks before they cause serious damage.
Posted: 19 Jan 2016 | Premiered: 03 Aug 2015
Get This Now


Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WEBCAST:In this webcast, experts will discuss today's rapidly evolving cyber threat landscape and offer solutions to detect incursions early so your company can respond quickly and avoid loss.
Posted: 18 Jan 2016 | Premiered: Mar 19, 2015
Get This Now


8 Reasons why Users are Rethinking their SIEM Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER:This brief yet informative infographic highlights eight reasons why having the right SIEM approach is critical to productivity, compliance and ROI. Read on to determine if your current SIEM practices are doing the most for your network security.
Posted: 11 Jan 2016 | Published: 11 Jan 2016
Get This Now


Network Security Monitoring Tools and Continuous Monitoring
sponsored by LogRhythm, Inc.
EGUIDE:This expert e-guide demonstrates why organizations need to rethink their network security tools, monitoring, and threat intelligence to eliminate vulnerabilities.
Posted: 21 Dec 2015 | Published: 16 Dec 2015
Get This Now


Advances and Benefits of SIEM Products
sponsored by LogRhythm, Inc.
EGUIDE:In this expert e-guide, learn the latest SIEM system advances to help mitigate malicious attacks as well as 3 additional benefits enterprises can enjoy from implementing an SIEM strategy.
Posted: 18 Dec 2015 | Published: 09 Dec 2015
Get This Now


Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER:Access this magic quadrant to learn how vendors are updating SIEM technologies for growing threat prevention needs, and how they can help you.
Posted: 12 Nov 2015 | Published: 20 Jul 2015
Get This Now


Critical Capabilities for Security Information and Event Management (SIEM)
sponsored by LogRhythm, Inc.
WHITE PAPER:Access this report for insight on aligning IT's needs with three key use cases to choose the best SIEM solution for the organization.
Posted: 12 Nov 2015 | Published: 21 Sep 2015
Get This Now


Anatomy of A Hack Disrupted
sponsored by LogRhythm, Inc.
WHITE PAPER:This white paper takes a close-up look one successfully mitigated malware attack, giving you insight on how to stop a potential cyber-breach.
Posted: 28 Oct 2015 | Published: 28 Oct 2015
Get This Now


Critical Capabilities Use Cases for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER:This vendor comparison reviews SIEM performance by three different use cases, showing you which SIEM platform works best for your business needs.
Posted: 27 Oct 2015 | Published: 21 Sep 2015
Get This Now


10 SIEM Platforms Tested for Security Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER:This report looks at ten different SIEM products and analyzes which one performs best when it comes to security event management.
Posted: 05 Aug 2015 | Published: 05 Aug 2015
Get This Now


Special Report: 10 SIEM Technologies Reviewed
sponsored by LogRhythm, Inc.
WHITE PAPER:This report analyzes ten different SIEM technologies for risk management, threat detection, and performance.
Posted: 05 Aug 2015 | Published: 05 Aug 2015
Get This Now


Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER:The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014
Get This Now


1 - 25 of 56 Matches
Page: 2 3 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement