All resources sponsored by:

HP Enterprise Security

8 Matches
Log management best practices
sponsored by HP Enterprise Security
EGUIDE:Investing in the correct log management tool can ensure that the pressures of maintaining enterprise system log data are greatly decreased. Although the right tool is very helpful, the possibility of it turning into the wrong tool can happen in the blink of an eye if the correct steps are not taken.
Posted: 29 Nov 2011 | Published: 29 Nov 2011
Get This Now


Compliance strategies for greater cyber security policies
sponsored by HP Enterprise Security
EGUIDE:Access this expert e-guide to learn compliance strategies for greater cyber security policies. Find out why the best security strategy is a solid, prevention-focused internal security policy, how crafting your audit kit before compiling compliance procedures leads to more passed audits, and more.
Posted: 05 Jun 2012 | Published: 01 Jun 2012
Get This Now


Risk Management: Safeguarding Against a World of Threats
sponsored by HP Enterprise Security
EBOOK:Access this expert e-book to discover all the different components that make up a comprehensive risk management policy. Uncover the importance of accurate risk management metrics, why governance, risk, and compliance are a unified framework, 4 components your risk management strategy may be missing, and more.
Posted: 17 May 2012 | Published: 01 May 2012
Get This Now


The Next Generation IPS
sponsored by HP Enterprise Security
WHITE PAPER:Today’s organizations are faced with the growing challenge of advanced persistent threats (APTs). These attacks are more sophisticated and stealthier, using a variety of techniques to probe and gain access to high-value information. In this paper, uncover how to defend against APTs using a new innovative approach, Next Generation IPS.
Posted: 07 May 2012 | Published: 04 May 2012
Get This Now


Presentation Transcript: Balancing compliance with security
sponsored by HP Enterprise Security
PRESENTATION TRANSCRIPT:This presentation transcript explores exactly what it means to be secure and compliant, as well as how security information management (SIM) can assist organizations in achieving both.
Posted: 30 Mar 2012 | Published: 20 Mar 2012
Get This Now


Improving regulatory compliance management through log analysis, SIM
sponsored by HP Enterprise Security
EGUIDE:This E-Guide highlights the importance of log analysis and security information and event management (SIEM) in improving regulatory compliance management.
Posted: 30 Mar 2012 | Published: 30 Mar 2012
Get This Now


IT Decision Checklist: Security Information and Event Management
sponsored by HP Enterprise Security
EZINE:As the complexity of the networks IT manages continues to increase, so too does the volume of security-related information generated by network devices. This exclusive e-zine explores the business and technical considerations in selecting the security information management (SIM) tools you need to maintain control.
Posted: 24 Feb 2012 | Published: 23 Feb 2012
Get This Now


A Decision Maker's Guide to Log Management
sponsored by HP Enterprise Security
EGUIDE:Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Inside this expert resource, learn what factors to consider when it’s time to get a handle on your logs.
Posted: 01 Nov 2011 | Published: 28 Oct 2011
Get This Now


8 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement