IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Multimedia (View All Report Types)
1 - 25 of 49 Matches Previous Page  |  Next Page
Forrester: Tips to Build Your Data Protection Business Case
sponsored by Digital Guardian
WEBCAST: This video will teach you how to establish success factors for data protection programs.
Posted: 04 Feb 2016 | Premiered: Nov 30, 2015

Digital Guardian

SANS_A Proactive Approach to Incident Response
sponsored by Blue Coat Systems
WEBCAST: Discover how to move to a proactive incident response model to stop cyber-attacks before they can steal data or harm your reputation.
Posted: 04 Feb 2016 | Premiered: Dec 31, 2015

Blue Coat Systems

Protect your Network with Effective Incident Response
sponsored by Blue Coat Systems
WEBCAST: For a holistic view of security, organizations need effective incident response. Watch this videocast to find a demo on comprehensive network forensics.
Posted: 02 Feb 2016 | Premiered: Dec 8, 2015

Blue Coat Systems

All Stars Panel: Healthcare Security Spotlight
sponsored by Optum
VIDEO: This video of four IT professional explores the top security priorities and projects being grappled with in health IT today, and the strategies that you can adopt to keep your information safe from breach.
Posted: 01 Feb 2016 | Premiered: 22 Jan 2016

Optum

The ISO 27001 Information Security Framework
sponsored by Coalfire
WEBCAST: This webcast introduces the ISO 27001 standard and how businesses can benefit from its framework to manage security.
Posted: 27 Jan 2016 | Premiered: Oct 27, 2015

Coalfire

The Realities of FedRAMP Continuous Monitoring and Penetration Testing Requirements
sponsored by Coalfire
WEBCAST: This webcast explores the requirements that CSPs must meet on monthly, quarterly and an annual basis. Find answers to common FedRAMP questions, solutions for complexities that continuous monitoring can present and lessons learned from the continuous monitoring portion of FedRAMP.
Posted: 26 Jan 2016 | Premiered: Sep 16, 2015

Coalfire

FedRAMP for SaaS
sponsored by Coalfire
WEBCAST: Watch this webcast to discover how FedRAMP can increase your confidence in the security of your cloud solutions.
Posted: 26 Jan 2016 | Premiered: Mar 18, 2015

Coalfire

The Impact of Spear Phishing: Enterprise Survey Findings
sponsored by Cloudmark
VIDEO: In this informative video, you'll hear from cyber security expert Morgan Wright and Cloudmark's SVP of engineering Leon Rishniw as they discuss the impacts of spear phishing. Tune in for details on how you can defend the enterprise against this expanding threat.
Posted: 22 Jan 2016 | Premiered: 13 Jan 2016

Cloudmark

SecureAuth - Houston Methodist
sponsored by SecureAuth
VIDEO: In this video, you will learn how to quickly and easily secure your authentication process for your employees to access both existing and new technologies. Move your business into the cloud with confidently and securely.
Posted: 21 Jan 2016 | Premiered: 15 Jan 2015

SecureAuth

Unisys Case Study
sponsored by SecureAuth
VIDEO: In this video, you will learn about a simple solution to secure your cloud access. Eliminate soft and hard FOB usage and strengthen your security process.
Posted: 21 Jan 2016 | Premiered: 13 Nov 2015

SecureAuth

Update your current Apple and Oracle software now
sponsored by WatchGuard Technologies, Inc.
VIDEO: Watch this video to learn about the latest updates to Mac OSX, iOS 9 and Oracle patch that will keep your network secure.
Posted: 20 Jan 2016 | Premiered: 19 Jan 2016

WatchGuard Technologies, Inc.

Detecting Data Exfiltration
sponsored by LogRhythm, Inc.
VIDEO: Watch this webcast and learn how you can rapidly detect, respond and neutralize breaches in your networks before they cause serious damage.
Posted: 19 Jan 2016 | Premiered: 03 Aug 2015

LogRhythm, Inc.

Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: Tune in for this webcast to learn 6 practical steps every IT admin should take before embarking on a SIEM deployment.
Posted: 18 Jan 2016 | Premiered: Jan 6, 2016

AlienVault

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WEBCAST: In this webcast, experts will discuss today's rapidly evolving cyber threat landscape and offer solutions to detect incursions early so your company can respond quickly and avoid loss.
Posted: 18 Jan 2016 | Premiered: Mar 19, 2015

LogRhythm, Inc.

Malware Detection: How to Spot Infections Early with AlienVault USM
sponsored by AlienVault
WEBCAST: With so many complicated threats to manage your company needs a simplified solution. Unified security managements (USM) is a single platform for simplified, accelerated threat detection, incident response and policy compliance.
Posted: 18 Jan 2016 | Premiered: Dec 16, 2015

AlienVault

How Enterprises Are Attacking the Cloud Security Challenge
sponsored by CloudPassage
WEBCAST: The aim of this webcast is to help you understand how data storage is changing and why we must change the way we secure it to ensure our data stays out of the wrong hands.
Posted: 15 Jan 2016 | Premiered: Dec 23, 2015

CloudPassage

Podcast: Cloud Access Security Brokers: Real World Use-Cases
sponsored by BitGlass
PODCAST: This podcast, the third in a series on the top brokers of cloud security, discusses some real world case studies across a number of industries.
Posted: 13 Jan 2016 | Premiered: Jan 5, 2016

BitGlass

Protect your Network with Effective Incident Response
sponsored by Blue Coat Systems
VIDEO: For a holistic view of security, organizations need effective incident response. Watch this videocast to find a demo on comprehensive network forensics.
Posted: 08 Dec 2015 | Premiered: 08 Dec 2015

Blue Coat Systems

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

SearchSecurity.com

Ensuring Compliance and Security in the Enterprise
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: Tune into this video to find an in-depth, indexed demonstration of an award-winning security intelligence platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: Access this webcast to discover how a credit union found the SIEM that met all of its security needs, and to learn how you can follow the same process for your SIEM selection.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

Mobilizing Security Intelligence: LogRhythm's UX for Web and Tablet
sponsored by LogRhythm, Inc.
VIDEO: In this video, Seth Goldhammer, Director of Product Management, tours and showcases LogRhythm's new User Experience (UX) for Web and Tablet.
Posted: 31 Jul 2014 | Premiered: 21 Feb 2014

LogRhythm, Inc.

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Intro to Faster Threat Intelligence
sponsored by OpenDNS
WEBCAST: In this webcast, learn how to dust for clues hackers leave behind in your network to remedy security threats before they escalate to issues.
Posted: 04 Feb 2016 | Premiered: Sep 22, 2015

OpenDNS
1 - 25 of 49 Matches Previous Page    1 2    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement