All resources sponsored by:

HP Enterprise Security

17 Matches
Video: Incorporate SIM tools to stay compliant
sponsored by HP Enterprise Security
VIDEOCAST:This resource outlines potential benefits of SIM and log analysis such as improvements in access control, data leak prevention and much more.
Posted: 10 Apr 2012 | Premiered: Apr 9, 2012
Get This Now


Compliance strategies for greater cyber security policies
sponsored by HP Enterprise Security
EGUIDE:Access this expert e-guide to learn compliance strategies for greater cyber security policies. Find out why the best security strategy is a solid, prevention-focused internal security policy, how crafting your audit kit before compiling compliance procedures leads to more passed audits, and more.
Posted: 05 Jun 2012 | Published: 01 Jun 2012
Get This Now


Exploring cloud Security as a Service options
sponsored by HP Enterprise Security
EGUIDE:There are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.
Posted: 21 May 2012 | Published: 21 May 2012
Get This Now


Risk Management: Safeguarding Against a World of Threats
sponsored by HP Enterprise Security
EBOOK:Access this expert e-book to discover all the different components that make up a comprehensive risk management policy. Uncover the importance of accurate risk management metrics, why governance, risk, and compliance are a unified framework, 4 components your risk management strategy may be missing, and more.
Posted: 17 May 2012 | Published: 01 May 2012
Get This Now


The Next Generation IPS
sponsored by HP Enterprise Security
WHITE PAPER:Today’s organizations are faced with the growing challenge of advanced persistent threats (APTs). These attacks are more sophisticated and stealthier, using a variety of techniques to probe and gain access to high-value information. In this paper, uncover how to defend against APTs using a new innovative approach, Next Generation IPS.
Posted: 07 May 2012 | Published: 04 May 2012
Get This Now


Emerging PaaS security tactics
sponsored by HP Enterprise Security
EGUIDE:Like all other cloud deployments, PaaS introduces some security concerns because of underlying security features that are beyond the customer’s control. This e-guide explores these challenges and lists security areas that can affect the risk profile of deployed applications, as well as offers key advice for mitigating risk.
Posted: 02 May 2012 | Published: 02 May 2012
Get This Now


Managing Cloud Computing Risk
sponsored by HP Enterprise Security
EGUIDE:Have you done your best to reduce the risk of harm to your company in the event of a service interruption? In this e-guide by SearchCloudSecurity.com, gain expert insight on how to manage the risk of cloud outages as well as uncover a framework you can implement for evaluating cloud computing risk.
Posted: 11 Apr 2012 | Published: 11 Apr 2012
Get This Now


The Need for Cloud Computing Security Standards
sponsored by HP Enterprise Security
EGUIDE:While cloud computing promises business advantages such as agility, efficiency, cost savings and more, many organizations are still hesitant to adopt for one prominent reason – security. In this expert e-guide uncover the driving need for cloud computing security standards and how this issue is being addressed.
Posted: 11 Apr 2012 | Published: 11 Apr 2012
Get This Now


Presentation Transcript: Balancing compliance with security
sponsored by HP Enterprise Security
PRESENTATION TRANSCRIPT:This presentation transcript explores exactly what it means to be secure and compliant, as well as how security information management (SIM) can assist organizations in achieving both.
Posted: 30 Mar 2012 | Published: 20 Mar 2012
Get This Now


Improving regulatory compliance management through log analysis, SIM
sponsored by HP Enterprise Security
EGUIDE:This E-Guide highlights the importance of log analysis and security information and event management (SIEM) in improving regulatory compliance management.
Posted: 30 Mar 2012 | Published: 30 Mar 2012
Get This Now


E-Guide: Securing the SIEM system: Control access, prioritize availability
sponsored by HP Enterprise Security
EGUIDE:Given the vital role a security information and event management (SIEM) system plays in an organization’s security infrastructure, a compromised or crashed system can mean devastating consequences. This e-guide explores the serious implications of a corrupted SIEM system and offers helpful tips on how to secure them.
Posted: 24 Feb 2012 | Published: 24 Feb 2012
Get This Now


IT Decision Checklist: Security Information and Event Management
sponsored by HP Enterprise Security
EZINE:As the complexity of the networks IT manages continues to increase, so too does the volume of security-related information generated by network devices. This exclusive e-zine explores the business and technical considerations in selecting the security information management (SIM) tools you need to maintain control.
Posted: 24 Feb 2012 | Published: 23 Feb 2012
Get This Now


Technical Guide on SIM: Moving beyond network security toward protecting applications
sponsored by HP Enterprise Security
EGUIDE:SIMs have been widely adopted for their value in correlating, reporting and alerting on network security. But SIMs can be used for more than just network security monitoring. The same tools can also bring value to application managers if used correctly. In this technical guide, gain 4 steps for integrating applications into enterprise SIMs.
Posted: 01 Jan 2012 | Published: 20 Dec 2011
Get This Now


Log management best practices
sponsored by HP Enterprise Security
EGUIDE:Investing in the correct log management tool can ensure that the pressures of maintaining enterprise system log data are greatly decreased. Although the right tool is very helpful, the possibility of it turning into the wrong tool can happen in the blink of an eye if the correct steps are not taken.
Posted: 29 Nov 2011 | Published: 29 Nov 2011
Get This Now


The various ways to fight new and emerging cybercrime
sponsored by HP Enterprise Security
EGUIDE:Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.
Posted: 29 Nov 2011 | Published: 29 Nov 2011
Get This Now


E-Guide: Selecting a SIM for midmarket business
sponsored by HP Enterprise Security
EGUIDE:This expert E-Guide discusses the evolvement of SIM tools, differences in deployment processes and top requirements you should consider before making a decision.
Posted: 01 Nov 2011 | Published: 31 Oct 2011
Get This Now


A Decision Maker's Guide to Log Management
sponsored by HP Enterprise Security
EGUIDE:Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Inside this expert resource, learn what factors to consider when it’s time to get a handle on your logs.
Posted: 01 Nov 2011 | Published: 28 Oct 2011
Get This Now


17 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement