IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Log Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Log Monitoring White Papers (View All Report Types)
 
Mobile Malware
sponsored by MobileIron
WHITE PAPER: Four major threats are currently targeting iOS and Android devices using very clever tactics. Learn how these new malware tools are infecting mobile devices today and how you can secure your data against these and other growing threats.
Posted: 07 Jun 2016 | Published: 01 May 2016

MobileIron

Security Performance Metrics Across Major World Economies
sponsored by BitSight
WHITE PAPER: This report shows you the security performance results of 250 organizations per country from the U.S., the U.K., Singapore, Germany, China and Brazil during May 2015 until May 2016. Discover how to help your organization's security stance as you move forward into new, global markets.
Posted: 28 Jun 2016 | Published: 01 May 2016

BitSight

Detect, Prioritize, and Respond to Modern Cyber Attacks
sponsored by Exabeam
WHITE PAPER: They need the ability to automatically analyze user behavior to respond effectively. Learn how to leverage existing log data to detect modern attacks and prioritize incidents efficiently. Used correctly, user behavior analytics adds a powerful analytics layer over existing security technologies, guiding a more effective response to attacks.
Posted: 20 May 2016 | Published: 31 Dec 2015

Exabeam

Improving payment Card Compliance
sponsored by Verizon
WHITE PAPER: Learn how the bank was able to secure customer data in a cost-efficient manner by focusing on the most important applications. With ongoing consulting, the bank can maintain the strong PCI stance it has built and continue to earn customer trust while driving business growth.
Posted: 07 Jun 2016 | Published: 01 May 2016

Verizon

Infographic: Breach Preparedness
sponsored by AllClear ID
WHITE PAPER: This infographic shows you statistics from business executives and consumers on how they handle and perceive a data breach. Learn how to properly deal with a major breach now, before it's too late to formulate a proper breach response plan.
Posted: 30 Jun 2016 | Published: 01 May 2016

AllClear ID

Cb Defense
sponsored by Carbon Black
WHITE PAPER: Discover how you can gain next-generation AV to stop more attacks, see more threats, and close more security gaps than ever before. Get unprecedented visibility and actionable intelligence while protecting servers, laptops, and desktops from advanced attackers.
Posted: 27 Jul 2016 | Published: 01 Jun 2016

Carbon Black

Aberdeen Group: Selecting Encryption for "Data at Rest" in Back-End Systems.
sponsored by Vormetric
WHITE PAPER: In this paper, the Aberdeen Group explores why full-disk encryption has become an attractive solution for the risks to data in use at the endpoints—and why file-level encryption is a better fit for the risks associated with data at rest in back-end systems.
Posted: 27 Jul 2016 | Published: 01 Jun 2015

Vormetric

What I've Learned from 5,000 Data Breaches
sponsored by AllClear ID
WHITE PAPER: As data breaches continue to increase, consumer expectations follow behind and expect well-orchestrated response time. Plan out how affected customers will be notified and supported throughout the entire data breach response process, from notification, to protection, to fraud resolution.
Posted: 29 Jun 2016 | Published: 01 May 2016

AllClear ID

The Top Five Requirements for Secure Enterprise File Sync and Sharing
sponsored by Citrix
WHITE PAPER: Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.
Posted: 24 Jun 2016 | Published: 01 May 2016

Citrix

Vendor Comparison for Web Application Firewalls
sponsored by Dimension Data
WHITE PAPER: Imperva, a leading provider of cyber security solutions is once again the only leader in Gartner's Magic Quadrant for Web Application Firewall—the only company positioned in the leader's quadrant by Gartner in each of the two years this report has been published.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Dimension Data
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement