All resources sponsored by:

AlienVault

22 Matches
Putting Military Strategy to Work Against Malicious Activity
sponsored by AlienVault
WHITE PAPER:Discover how your enterprise can put the OODA Loop philosophy (developed by US Air Force military strategist John Boyd) to work in combating data breeches. Lean to observe a crisis from all angles, review events in the context of other activity on network to establish a timeline, quickly implement remediation on affected assets, and more.
Posted: 27 Jul 2016 | Published: 27 Jul 2016
Get This Now


Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
sponsored by AlienVault
WEBCAST:Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Posted: 26 Jul 2016 | Premiered: Jun 1, 2016
Get This Now


5 Steps to Implement and Maintain PCI DSS Compliance
sponsored by AlienVault
RESOURCE:In this resource you'll find an easy to follow guide for success when it comes to the troubles Payment Card Industry Data Security Standards can cause your enterprise.
Posted: 26 Jul 2016 | Published: 26 Jul 2016
Get This Now


Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST:Discover 6 steps to utilize any SIEM solution and maximize your network's security. Learn how to break down the evaluation, deployment, and management of your SIEM.
Posted: 26 Jul 2016 | Premiered: Jul 26, 2016
Get This Now


Insider Threats: How to Spot Trouble Quickly with AlienVault USM
sponsored by AlienVault
WEBCAST:Join us for this technical demo showing how USM can help you detect malware infections on end-user machines, insiders misusing network resources, and users engaging in suspicious behaviors.
Posted: 25 Jul 2016 | Premiered: Jun 1, 2016
Get This Now


Unified Security Management vs. SIEM: a Technical Comparison
sponsored by AlienVault
WHITE PAPER:Discover a comprehensive overview of SIEM, including how it's changing, challenges faced by its users, different options, and how a unified platform can make all the difference when it comes it its deployment.
Posted: 22 Jul 2016 | Published: 22 Jul 2016
Get This Now


Get Real-Time Threat Detection
sponsored by AlienVault
PRODUCT DEMO:A successful unified security management (USM) system can allow you to discover all IP-enables assets on your network, identify vulnerabilities quickly, and much more.
Posted: 01 Apr 2016 | Premiered: 01 Apr 2016
Get This Now


How to Simplify PCI DSS Compliance with AlienVault USM
sponsored by AlienVault
WEBCAST:In this informative webinar, explore how to adjust your PCI DSS compliance strategy to eliminate complexities and protect customer data.
Posted: 31 Jul 2015 | Premiered: Jul 2, 2015
Get This Now


Security Operations Center (SOC) Essentials for the SME
sponsored by AlienVault
WEBCAST:Watch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.
Posted: 16 Jun 2014 | Premiered: Jun 16, 2014
Get This Now


How to Limit the Risk of Attack on your XP Assets
sponsored by AlienVault
WEBCAST:This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014
Get This Now


451 Group Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER:This report analyzes where AlienVault fits into the SMB security market. Read on for descriptions of products that AlienVault offers and considerations surrounding the main strengths, weaknesses, opportunities and threats facing the organization in relation to its competitors.
Posted: 05 May 2014 | Published: 26 Mar 2014
Get This Now


Unified Security Management: Real-time Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE:This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014
Get This Now


The SIEM Evaluator's Guide
sponsored by AlienVault
WHITE PAPER:This guide takes a look at the current trends in security management and how an effective SIEM strategy can help you ensure security.
Posted: 04 Mar 2014 | Published: 04 Mar 2014
Get This Now


PCI DSS v3.0: How to Adapt your Compliance Strategy
sponsored by AlienVault
WEBCAST:With version 3.0 of PCI DSS now available, it's time to review your compliance strategy and make a plan for adapting to the revised requirements. View this webcast to learn more about the significant changes related to malware defenses, vulnerability assessments and penetration testing.
Posted: 20 Dec 2013 | Premiered: Dec 20, 2013
Get This Now


6 Steps to SIEM Success
sponsored by AlienVault
WEBCAST:In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013
Get This Now


PCI DSS Simplified: What You Need to Know
sponsored by AlienVault
WEBCAST:Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.
Posted: 14 Oct 2013 | Premiered: Oct 14, 2013
Get This Now


AlienVault Unified Security Management: Complete Security Visibility
sponsored by AlienVault
TRIAL SOFTWARE:AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013
Get This Now


SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AlienVault
WEBCAST:Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013
Get This Now


Practitioners Guide to Establishing a SOC Webinar
sponsored by AlienVault
WEBCAST:This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013
Get This Now


Expect More From Your SIEM
sponsored by AlienVault
WEBCAST:Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013
Get This Now


Quick Dirty Dozen PCI Compliance Simplified
sponsored by AlienVault
WEBCAST:Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013
Get This Now


Practitioner's Guide to Establishing an SOC
sponsored by AlienVault
WHITE PAPER:This white paper provides an overview of how to evaluate the security controls needed to establish a Security Operation Center (SOC), along with what data a SOC needs to quickly detect and respond to a breach.
Posted: 12 Jul 2013 | Published: 09 Apr 2013
Get This Now


22 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement