IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management White Papers (View All Report Types)
1 - 25 of 155 Matches Previous Page  |  Next Page
Don’t Let Your DDoS Defense Fall Behind
sponsored by Neustar®
WHITE PAPER: This white paper examines the pros and cons of several different DDoS mitigation approaches. Access now to learn how to evaluate and choose the ideal strategy based on your risk assessment.
Posted: 01 Jul 2015 | Published: 13 May 2015

Neustar®

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

SaaS - Simplifying Network Security and Compliance
sponsored by SilverSky
WHITE PAPER: This white paper examines the benefits of migrating to a SaaS security model.
Posted: 02 Jun 2015 | Published: 13 May 2015

SilverSky

Outrunning the Bear: 5 Critical Ways To Take a More Collaborative Approach To IT Security
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper examines the challenges inhibiting faster threat response and suggests five critical steps organizations can take to turn security intelligence into action.
Posted: 29 May 2015 | Published: 29 May 2015

Hewlett-Packard Company

Today's Top 8 Cybersecurity Threats
sponsored by Dell Software
WHITE PAPER: This informative white paper presents and details the top cybersecurity threats and attacks to help your organization re-evaluate your security strategy.
Posted: 28 May 2015 | Published: 01 Apr 2015

Dell Software

The Quick Guide to Data Protection Managed Security Services
sponsored by NexGen Storage
WHITE PAPER: This white paper explores the 3 reasons cybercriminals target organizations with limited IT staffs and why data protection needs to be the number one priority.
Posted: 27 May 2015 | Published: 29 Apr 2015

NexGen Storage

Next Generation Data Loss Prevention
sponsored by Clearswift
WHITE PAPER: In this white paper, discover a content-aware data loss prevention (DLP) solution that offers stronger security for your mission critical information. Click through for a simple 8-step implementation strategy.
Posted: 26 May 2015 | Published: 22 Apr 2015

Clearswift

Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization
sponsored by Mimecast
WHITE PAPER: This white paper presents the timeline of a spear-phishing attack and the common security strategies used that ultimately fail to protect the organization.
Posted: 26 May 2015 | Published: 22 Apr 2015

Mimecast

DLP Defense for Insider Threats
sponsored by Clearswift
WHITE PAPER: This white paper examines a DLP approach to remove content that breaks policy or industry GRC requirements. Continue reading to learn how to mitigate risks and secure communication in the collaboration or sharing processes.
Posted: 22 May 2015 | Published: 05 May 2015

Clearswift

Next-Gen DLP: Can It Protect Your Organization?
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen DLP that is adaptive and content/context aware and how it mitigates internal and external data theft and/or leaks. Continue reading to learn what is on the horizon for next-gen DLP and how it will evolve in the coming years.
Posted: 21 May 2015 | Published: 06 May 2015

Clearswift

A New Security Strategy: Focusing on Risk
sponsored by Clearswift
WHITE PAPER: This white paper explores how to shift your security strategy from a compliance-based model to a risk-based model to protect strategic assets. Continue reading and discover how to improve your overall security strategy by implementing a security training and awareness program.
Posted: 20 May 2015 | Published: 29 Apr 2015

Clearswift

Benefit from Collaboration without Compromising Security
sponsored by Clearswift
WHITE PAPER: This informative whitepaper outlines a strategy for facilitating collaboration without compromising your IT security.
Posted: 19 May 2015 | Published: 03 Jun 2014

Clearswift

Mitigating Data Sharing Risks and Leaks
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores an alternative approach to reducing data sharing risks between internal teams and outside parties. View now to learn how to safeguard data and files and minimize leaks.
Posted: 14 May 2015 | Published: 25 Mar 2015

IntraLinks, Inc

Fighting Today's Advanced Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper demystifies APTs and reveals a three phase strategy to defending your network against determined cybercriminals.
Posted: 13 May 2015 | Published: 22 Apr 2015

Fortinet, Inc.

Advanced Attacks Require an Advanced Solution
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper outlines a simple three phase framework for detecting and blocking concealed threats and protecting data on your network and beyond.
Posted: 12 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

How to Better Guard Against a Security Breach
sponsored by Hewlett-Packard Company
WHITE PAPER: SIEM adoption may be increasing, but only 20% of organizations use their SIEM systems to their full capacity. In this study, learn why that is – and how you can bring your SIEM use to the next level.
Posted: 11 May 2015 | Published: 11 May 2015

Hewlett-Packard Company

Shellshock and Future Vulnerabilities — Buying Precious Time
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to explore how Shellsock works, how attackers are exploiting network vulnerabilities, and what to do about future vulnerabilities.  View now to learn more.
Posted: 11 May 2015 | Published: 01 Apr 2015

Dell, Inc.

Research Report: The Benefits of Security Analytics
sponsored by Prelert
WHITE PAPER: Read this report to discover what IT pros have to say about security analytics' most useful features, its value, and more.
Posted: 05 May 2015 | Published: 30 Apr 2015

Prelert

Top 10 Data Security Tips to Mitigate Threats
sponsored by Absolute Software
WHITE PAPER: This white paper outlines the top 10 security tips and best practices to secure your data and fend off the barrage of incoming attacks.
Posted: 01 May 2015 | Published: 30 Oct 2014

Absolute Software

Breaking Bad: The Risk of Insecure File Sharing
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores the risks and vulnerabilities of using file sync and share solutions and ungoverned practices. Read on to learn the 11 key steps to protecting data in the collaborative file-sharing environment.
Posted: 01 May 2015 | Published: 15 Oct 2014

IntraLinks, Inc

Rules Of Engagement: A Call To Action To Automate Breach Response
sponsored by Digital Guardian
WHITE PAPER: This white paper delves into why security teams need to automate incident response (IR) plans to defend against dynamic cybercriminal attacks.
Posted: 14 Apr 2015 | Published: 02 Dec 2014

Digital Guardian

Comprehensive Data Protection Against Insider & Outsider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explores how you can implement data protection that travels with your data regardless of location or device.
Posted: 14 Apr 2015 | Published: 25 Mar 2015

Digital Guardian

The Paradigm Shift in Cybersecurity
sponsored by UnitedLex
WHITE PAPER: This white paper explores why hackers have the upper hand and why organizations need to ramp up security measures regardless of their current status.
Posted: 13 Apr 2015 | Published: 08 Oct 2014

UnitedLex

5 Myths Holding Your Security Program Back
sponsored by Digital Guardian
WHITE PAPER: This white paper explores the five common security myths that actually hinder data protection efforts.  View now to learn more.
Posted: 10 Apr 2015 | Published: 25 Feb 2015

Digital Guardian

Under Threat or Compromise Every Detail Counts
sponsored by Blue Coat Systems
WHITE PAPER: This white paper breaks down the five essential steps of security management to help you create a more comprehensive defense suited for today's threat landscape.
Posted: 08 Apr 2015 | Published: 31 Aug 2014

Blue Coat Systems
1 - 25 of 155 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement