IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Log Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Log Monitoring White Papers (View All Report Types)
 
Three guiding principles for data security and compliance
sponsored by IBM
WHITE PAPER: This white paper talks about the world's growing focus on data protection and what current challenges organizations face. Access now to discover why you need a comprehensive approach to data security and learn three guiding principles to achieve better security compliance.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

Nine steps of a digital transformation journey
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This white paper shows you nine steps that can guide evolution within your organization. Design your transformative business model and use the latest technology to create modern architectures all while securing your enterprise.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

Hewlett-Packard Enterprise

Cyber Dwell Time and Lateral Movement
sponsored by Forcepoint
WHITE PAPER: Today's organizations should not only focus on keeping hackers out, but also remediating damages once a breach occurs. This white paper shows you how to best deal with cyber attackers once a breach happens and how to keep attackers afraid to come back.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Forcepoint

Real-Time, Unified Endpoint Protection: A New Era in Incident Response
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper teaches you about the only endpoint protection platform that natively integrates prediction, prevention, detection and response. Save considerable time, money and energy while simultaneously improving your overall security posture.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

IDS Evaluation Guide
sponsored by AlienVault
WHITE PAPER: This white paper provides a useful reference for evaluating IDS tools. In it, you'll learn the critical components of host and network IDS, giving you real-time threat intelligence to quickly respond to threats.
Posted: 04 Apr 2016 | Published: 01 Mar 2016

AlienVault

MIMIX Availability: The easy way to protect the availability of even the most complex IBM i environments
sponsored by Vision Solutions
WHITE PAPER: In this white paper, you will learn about a simple, yet robust protection platform that efficiently backs up business applications in the event of a production server failure. Access now for 24/7 availability and storage of all your organization's application data.
Posted: 13 Apr 2016 | Published: 31 Jan 2016

Vision Solutions

Four top cyber crime trends
sponsored by IBM
WHITE PAPER: This report provides insight into the security issues of today's IT environment. While incidents around the globe are diverse, most of them share certain characteristics and fit recurring patterns.
Posted: 11 Mar 2016 | Published: 31 Dec 2015

IBM

Building an Enterprise Security Architecture
sponsored by Forcepoint
WHITE PAPER: This ESG report outlines the current security problems faced by organizations across industries and shows you new methods to tackle them. Access now to learn how you can get an enterprise security architecture built for integration, central command and control, distributed enforcement and comprehensive monitoring.
Posted: 27 Apr 2016 | Published: 01 Mar 2016

Forcepoint

Securing Mobility Management in the Cloud
sponsored by BlackBerry
WHITE PAPER: Discover how to securely manage mobile devices and other endpoints across different operating systems ownership models. Learn how to manage your mobile workers' access to apps, data and content, all from a single, easy-to-use console.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

BlackBerry

The Importance of Threat Intelligence, Visibility and Disrupting the Kill Chain
sponsored by Dell SecureWorks
WHITE PAPER: This white paper shows you a better, more comprehensive approach to endpoint security challenges. Learn how to catch bad network behavior and learn telltale signs that a breach is imminent.
Posted: 28 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement