IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Log Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Log Monitoring Multimedia (View All Report Types)
 
The New Network Security Front Line
sponsored by Ixia
WEBCAST: Learn how to decrease your network's attack surface to minimize the number of threats that can potentially breach your defenses. View now and discover how to block confirmed bad IPs with no false positives, block internal botnet, phishing, and other malicious communications from getting out, and more.
Posted: 18 Mar 2016 | Premiered: Jan 6, 2016

Ixia

All Stars Panel: Healthcare Security Spotlight
sponsored by Optum
VIDEO: Listen in as four senior health IT professionals explore the top security priorities and projects being grappled with in healthcare today, and the strategies that you can adopt to keep your patients' medical information safe from breach.
Posted: 01 Feb 2016 | Premiered: 22 Jan 2016

Optum

Detecting Data Exfiltration
sponsored by LogRhythm, Inc.
VIDEO: Watch this webcast and learn how you can rapidly detect, respond and neutralize breaches in your networks before they cause serious damage.
Posted: 19 Jan 2016 | Premiered: 03 Aug 2015

LogRhythm, Inc.

Prevent Email Breaches with Zix
sponsored by ZixCorp
VIDEO: This video shows you how to put an end to email data loss and misplaced attachments. Access now to learn how you can get a second chance at catching mistakes and add another layer of authorization before sending out important information.
Posted: 10 May 2016 | Premiered: 01 Apr 2016

ZixCorp

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School, you'll learn how the latest targeted attacks are developed, where your soft spots may be, how attackers are infiltrating data from your networks and what you can do to keep your critical data locked down.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

Tracking the Most Significant Cyber Threat
sponsored by OpenDNS
WEBCAST: This webcast shows you steps you can take to better protect your organization and reduce the risk of ransomware infections.
Posted: 18 Apr 2016 | Premiered: Mar 30, 2016

OpenDNS

Security Analytics Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to develop a customized program that delivers insightful, actionable security analytics. Key points of emphasis include defining success, identifying needs, developing and integrating data sources, and ultimately analyzing information and using it to make smarter security decisions.
Posted: 07 Feb 2014 | Premiered: 14 Feb 2014

SearchSecurity.com

Practitioners Guide to Establishing a SOC Webinar
sponsored by AlienVault
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AlienVault

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AlienVault
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AlienVault

GFI PCI Suite
sponsored by GFI Software
TRIAL SOFTWARE: The GFI PCI Suite is a package comprising the core software required for PCI DSS compliance.
Posted: 22 Jun 2007 | Premiered: 01 Jun 2007

GFI Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement