IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Log Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Log Monitoring White Papers (View All Report Types)
 
Prevent Data Loss with Exabeam
sponsored by Exabeam
WHITE PAPER: User behavior analytics (UBA) provides the context needed to evaluate user behavior accurately and efficiently. It focuses on the user handling the data rather than the data itself. Learn how you can pair your DLP tools with UBA to best prevent data loss and exfiltration.
Posted: 16 May 2016 | Published: 01 Apr 2016

Exabeam

Top 6 Security Measures for the Enterprise Campus Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover a next-generation security model that moves away from traditional security tools. Learn how you can bring together all critical network security elements to provide an integrated security framework for your cloud-enabled enterprise.
Posted: 11 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

Encrypt Everything How to Unshare and Secure Your Sensitive Data Wherever It Resides
sponsored by Gemalto
WHITE PAPER: Stuck in the data protection dilemma? How do you find a way to balance critical business needs and requirements, while protecting your data from malicious threats? Learn a multitier plan that helps you protect your perimeter while also encrypting data in every level, moving or at rest.
Posted: 17 May 2016 | Published: 01 Apr 2016

Gemalto

IT Security Vendor Analysis by Bizety
sponsored by Distil Networks
WHITE PAPER: This white paper examines five major vendors and evaluates their security solutions. Learn how well they can coordinate their systems to successfully secure your web infrastructure and online data.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks

Preventing Fraud Before Customers Become Affected
sponsored by IBM
WHITE PAPER: Learn how Pulaski Bank achieved the layered security and malware prevention they were looking for and how their struggles can benefit your organization. Not only will you prevent potential fraud, but also increase customer awareness.
Posted: 09 Jun 2016 | Published: 01 May 2016

IBM

IBM Security QRadar Incident Forensics
sponsored by IBM
WHITE PAPER: Discover a solution to ensure visibility and clarity into breach-related network activities. Uncover how to investigate malicious actions on your enterprise's network using holistically-drawn data, simplify the query process with a search engine-like interface, build new intelligence by labeling suspected content, and more.
Posted: 16 Jun 2016 | Published: 31 Dec 2014

IBM

IT Guide: Windows 10 Migration Minus The Complexity
sponsored by Druva Software
WHITE PAPER: In just six steps, you can leverage endpoint data protection to help you ease into OS migration. Learn how to craft a migration plan that drastically simplifies the OS refresh process and provides comprehensive data protection and governance foundation for your organization.
Posted: 16 May 2016 | Published: 31 Dec 2015

Druva Software

Application Session Filtering
sponsored by Gigamon
WHITE PAPER: Bringing intelligent application-aware traffic visibility and filtering relevant applications to these security tools will help them work at their most optimum while uncovering malicious communication patterns.
Posted: 27 May 2016 | Published: 31 Dec 2015

Gigamon

Endpoint Encryption Keeps Your Data Safe
sponsored by Intel Security
WHITE PAPER: Discover customizable solutions to keep your enterprise data safe using endpoint encryption. Confidently ensure consistent and persistent data protection across all your network devices with a proven solution that allows you to secure data on office desktop PCs, Macs, mobile laptops, VDI workstations.
Posted: 12 May 2016 | Published: 01 Apr 2016

Intel Security

Complete Data Protection
sponsored by Intel Security
WHITE PAPER: Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Plus learn how to implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.
Posted: 23 May 2016 | Published: 01 Apr 2016

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement