IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management White Papers (View All Report Types)
1 - 25 of 265 Matches Previous Page  |  Next Page
Gartner Market Guide for Data-Centric Audit and Protection
sponsored by Imperva
WHITE PAPER: Read this white paper to learn how multi-layer big data architectures increase vulnerabilities and what requirements are essential for big data audit and protection.
Posted: 10 Feb 2016 | Published: 15 Dec 2015

Imperva

Complete Website Security and the Fight Against Organized Cybercrime
sponsored by Symantec Website Security
WHITE PAPER: This white paper explores the numerous types of attacks aiming to take your website down and/or cause a data breach and why organizations can't keep up with this onslaught alone. Read on to find out if comprehensive security could be the answer to blocking malicious threats.
Posted: 10 Feb 2016 | Published: 30 Dec 2015

Symantec Website Security

Forrester Endpoint Thought Leadership Paper
sponsored by Palo Alto Networks
WHITE PAPER: This white papers shows solutions that deliver strong integration between network and endpoint security.
Posted: 10 Feb 2016 | Published: 31 Aug 2015

Palo Alto Networks

4 Step Get Started Guide to Open Source Security Triage
sponsored by Black Duck Software
WHITE PAPER: This white paper helps you ask the right questions about your open source security vulnerabilities and find answers to them.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Business on the Internet - A Scary Reality
sponsored by LogicNow
WHITE PAPER: This white paper shows you different methods cybercriminals can use to ruin your business. The vast majority of infections can be attributed to user error falling victim to their tactics.
Posted: 10 Feb 2016 | Published: 27 Jan 2016

LogicNow

Comprehensive SSL Certificate Management
sponsored by Symantec Website Security
WHITE PAPER: By following six simple steps and the right methodology, proper SSL certificate management is achievable. In this white paper, discover the benefits of proper SSL certificate management.
Posted: 09 Feb 2016 | Published: 30 Dec 2015

Symantec Website Security

Cyber Threat Intelligence Buyers Guide
sponsored by Digital Shadows
WHITE PAPER: This white paper provides an overview of current cyber threat intelligence approaches and types of offerings available. It looks at the rise of digital business in today's world and at the impact that threat intelligence has had on the market.
Posted: 09 Feb 2016 | Published: 27 Jan 2016

Digital Shadows

This is not and Org chart of your company It's a diagram of your security risks
sponsored by Cisco
WHITE PAPER: This graphic shows you current trends in cyber risk and statistics to what you can do differently. It talks about various new access points hackers have to penetrate your network including the cloud and the Internet of Everything.
Posted: 09 Feb 2016 | Published: 27 Jan 2016

Cisco

Cybersecurity Buyers Guide
sponsored by Palo Alto Networks
WHITE PAPER: This white paper shows you how to keep up with the hackers and defend against all advanced threats. Read more to learn how to architect a cyber security solution that dynamically adapts to changing threats.
Posted: 09 Feb 2016 | Published: 31 Dec 2015

Palo Alto Networks

Shifting Threat Environment Undercuts Defenses
sponsored by Symantec Website Security
WHITE PAPER: In this white paper, learn how to patch vulnerabilities and detect hidden advanced threats on your network and website.
Posted: 08 Feb 2016 | Published: 30 Dec 2015

Symantec Website Security

ESG Brief: Threat Intel as part of Cyber Situational Awareness
sponsored by Digital Shadows
WHITE PAPER: This white paper shows you a new threat intelligence provider that offers a SaaS-based portal and team of intelligence operations analysts that can tailor threat intelligence to your needs.
Posted: 08 Feb 2016 | Published: 31 Dec 2015

Digital Shadows

Prioritizing Security at management and board levels
sponsored by Cisco
WHITE PAPER: This white paper analyzes the IT security capabilities in the UK.
Posted: 08 Feb 2016 | Published: 31 Dec 2015

Cisco

Pervasive Security Across Your Extended Network
sponsored by Cisco
WHITE PAPER: This white paper simplifies the statistic of today's cybercrime environment to show how you can protect yourself.
Posted: 08 Feb 2016 | Published: 13 Jan 2016

Cisco

Security Operations in the Cloud
sponsored by TrendMicro
WHITE PAPER: This white paper discusses some best practices to adopt in securing workloads in Amazon Web Services.
Posted: 05 Feb 2016 | Published: 31 Jan 2016


Cyber Situational Awareness
sponsored by Digital Shadows
WHITE PAPER: This white paper explores cyber situational awareness and presents a three-staged approach to incorporate cyber situational awareness into your defenses.
Posted: 05 Feb 2016 | Published: 31 Jan 2016

Digital Shadows

Cisco Advanced Malware Protection Virtual Private Cloud Appliance
sponsored by Cisco
WHITE PAPER: In this white paper, you will discover a solution that delivers advanced malware protection using big data analysis, continuous analysis and security intelligence stored locally.
Posted: 05 Feb 2016 | Published: 31 Jan 2016

Cisco

Cisco Advanced Malware Protection Leads Again in NSS Test
sponsored by Cisco
WHITE PAPER: In this white paper, you will learn how to reduce both detection time and remediation time. Go beyond point-in-time detection with your security solutions.
Posted: 05 Feb 2016 | Published: 31 Dec 2015

Cisco

Making Software-Defined Security Work for Your Data Center
sponsored by NTT Com Security (UK) Ltd
WHITE PAPER: This white paper explores micro-segmentation, a new and popular network security approach, and how to stop hackers from moving laterally within the data center.
Posted: 05 Feb 2016 | Published: 30 Dec 2015

NTT Com Security (UK) Ltd

Cisco Advanced Malware Protection for Networks
sponsored by Cisco
WHITE PAPER: This white paper shows you an advanced malware protection solution that detects, blocks, tracks and contains malware threats across multiple threat vectors.
Posted: 05 Feb 2016 | Published: 31 Dec 2015

Cisco

Optimize Anomaly Detection: Insider Tips for Success
sponsored by Prelert
WHITE PAPER: This brief white paper teaches you how to properly backfill historical data to build baseline analyses for ongoing anomaly searches. View now for expert anomaly detection tips and tricks.
Posted: 04 Feb 2016 | Published: 06 Jul 2015

Prelert

Making Risk Management More Effective with Security Ratings
sponsored by BitSight
WHITE PAPER: This white paper talks about some of the security risk management approaches organizations have taken as well as new approaches to othe growing problems.
Posted: 04 Feb 2016 | Published: 30 Apr 2014

BitSight

Ponemon Study Finds IT Security Not Prepared for Advanced Attacks
sponsored by Prelert
WHITE PAPER: This white paper examines how security vulnerabilities compile when you ignore your organization's threat intelligence strategy. View now to learn the top network threats and how to detect them faster by enhancing threat intelligence.
Posted: 04 Feb 2016 | Published: 28 Oct 2015

Prelert

The Evolution of Vendor Risk and Management in Financial Institutions
sponsored by BitSight
WHITE PAPER: This white paper talks about the Financial Service industry's pioneering in developing risk management practices.
Posted: 04 Feb 2016 | Published: 31 Jan 2016

BitSight

Compensating Security Controls for Windows Server 2003 Security
sponsored by TrendMicro
WHITE PAPER: This white paper shows you a solution while you're in the process of migration. Learn how you can get network, system and anti-malware security controls across physical, virtual and cloud systems running W2K3.
Posted: 04 Feb 2016 | Published: 31 May 2015


Gartner Magic Quadrant for Web Application Firewalls
sponsored by Imperva
WHITE PAPER: Imperva, a leading provider of cyber security solutions is once again the only leader in Gartner's Magic Quadrant for Web Application Firewall—the only company positioned in the leader's quadrant by Gartner in each of the two years this report has been published.
Posted: 10 Feb 2016 | Published: 15 Jul 2015

Imperva
1 - 25 of 265 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement