IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Log Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Log Monitoring White Papers (View All Report Types)
 
Deliver Complete Security for Enterprise Web Applications
sponsored by Blue Coat Systems
WHITE PAPER: Learn how to fully protect web applications without adversely affecting web performance for your users. Address all of today's critical web vulnerabilities while at the same time accelerating web applications for optimal productivity.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Blue Coat Systems

From Reactive to Proactive: How to Avoid Alert Fatigue
sponsored by ThreatConnect
WHITE PAPER: Learn how to prioritize security alerts and reduce alert fatigue. Discover how to achieve active response, allowing you to respond to attacks as quickly as they are detected.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

ThreatConnect

Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

The Phishing Breakthrough Point
sponsored by KnowBe4
WHITE PAPER: Habits take time to form and become part of one's daily life – the same applies to being cyber street-smart about phishing prevention. Learn how to create a more effective phishing awareness training program through deeper analysis of the human landscape of your organization.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

How to Identity Web Threats in Real-Time
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover how you can achieve real-time web protection and dynamic malware scanning in your existing security infrastructure. Learn how you can quickly enforce network access policies, instantly report on web threats and user activity, and more.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Symantec & Blue Coat Systems

Reinventing Data Protection for Digital Transformation
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Uncover the strategies your organization can use to overcome the data complexities of the modern reality of data. Learn the growing importance of data as an asset, as well as the need for new data protection and management strategies fit for purpose.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Hewlett-Packard Enterprise

Redefining Next-generation Endpoint Security Solutions
sponsored by Intel Security
WHITE PAPER: Discover how to streamline security operations using next-generation endpoint security. Learn about new tools built for centralization, consolidation and integration that can help you prevent advanced malware from infecting your endpoints and crippling your organization.
Posted: 09 Dec 2016 | Published: 01 Oct 2016

Intel Security

Nine Types of Cyber Threats and How to Stop Them
sponsored by Solarwinds MSP
WHITE PAPER: Learn how to create an effective IT strategy against all unknown and known threats, how to improve security by viewing customers' networks as targets, and more.
Posted: 09 Jan 2017 | Published: 09 Jan 2017

Solarwinds MSP

Finding a Better Metaphor, Staring into the Cloud, and What to Expect at RSA 2017
sponsored by Booz Allen Hamilton
WHITE PAPER: This white paper explores the security challenges of cloud and IoT, and examines which topics dominated the 2017 RSA conference. Find out which security paradigms are shifting and learn how security pros are putting a new spin on old topics, like how analytics and intelligence are increasing their role in threat and event management.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

Booz Allen Hamilton
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement