IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management White Papers (View All Report Types)
1 - 25 of 492 Matches Previous Page  |  Next Page
Solution Brief: Waste Less Time Fighting Ransomware Attacks
sponsored by OpenDNS
WHITE PAPER: Discover how to map out the internet infrastructure that attackers use to launch current and future attacks. Learn how to not only immediately validate malicious domains and IPs, but also pivot on different data points to build out a view of other related infrastructure used in attacks.
Posted: 30 Sep 2016 | Published: 31 Aug 2016

OpenDNS

Retail Tip Sheet
sponsored by Trustwave
WHITE PAPER: It's easy to assume your organization won't fall victim if you've check off all compliance requirements. But hackers are always evolving their methods to get what you don't want them to have. Discover 10 practices you can enact to avoid costly data breaches.
Posted: 30 Sep 2016 | Published: 31 Aug 2016

Trustwave

Your MSSP Decision Guide
sponsored by Trustwave
WHITE PAPER: Discover key questions and considerations to help you select an MSSP and evaluate their solutions to better secure your business. Access now to find how much global reach your MSSP should have, what it means to have security expertise, and more.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Trustwave

MYDIGIPASS for Healthcare
sponsored by VASCO Data Security International
WHITE PAPER: Discover a unified ID proofing method and authentication tool that can be used throughout all applications and platforms. Access now to learn the five critical elements to support trusted digital identities and secure information exchange within healthcare organizations and HIT providers.
Posted: 30 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

DIGIPASS GO 7
sponsored by VASCO Data Security International
WHITE PAPER: Discover a convenient single-button authentication device that boosts security while providing unmatched user acceptance. Access now to learn how to economically deploy a comprehensive, scalable, high performance two-factor authentication solution for secure network/remote access.
Posted: 30 Sep 2016 | Published: 31 Dec 2015

VASCO Data Security International

2016 Security Pressures Report
sponsored by Trustwave
WHITE PAPER: No matter what your security maturity level looks like, you undoubtedly have security pressures you'd like to alleviate. This report serves as a reliable compass of where your security efforts need to be in 2016 and into the future. Learn how to not only placate the pressure, but to help make your organization more secure overall.
Posted: 30 Sep 2016 | Published: 31 Aug 2016

Trustwave

Cisco 2016 Midyear Cybersecurity Report
sponsored by OpenDNS
WHITE PAPER: Get a global perspective on cybersecurity over the past half-year and learn what techniques other organizations are using to bolster their security practices. Discover what you must do to effectively undermine cybercriminals and ultimately catch them, ending their attacks at the source.
Posted: 30 Sep 2016 | Published: 01 Jul 2016

OpenDNS

APRIL 2016 SECURITY OPERATIONS CENTER REPORT
sponsored by Neustar
WHITE PAPER: This report analyzes some of the major attack types seen in today's digital world and discusses trends for the future of cyber threats. You'll see statistics on DDoS attack vectors, attack volume and what sort of damage these attacks caused so you can best plan for the dangerous future of cybercrime.
Posted: 29 Sep 2016 | Published: 31 Aug 2016

Neustar

April 2016 Neustar DDoS Attacks & Protection Report
sponsored by Neustar
WHITE PAPER: This report represents a global view of the DDoS outlook with insights and data from 6 continents and more than one thousand executives. Discover what the future portends for your organization and learn why security should be a central concern for all devices on your network.
Posted: 29 Sep 2016 | Published: 30 Apr 2016

Neustar

How Healthcare Benefits from Cloud-delivered Security
sponsored by OpenDNS
WHITE PAPER: By utilizing the cloud for healthcare, you can enhance security today while ensuring scalability into the future. Learn how to deal with malware, ransomware and other threats that impact patient well-being and best come into regulatory compliance with the cloud.
Posted: 29 Sep 2016 | Published: 31 Aug 2016

OpenDNS

Q2 2016 State of the Internet Security Report | Akamai
sponsored by Akamai
WHITE PAPER: Discover how dire the world of DDoS security attacks has become and dig into the details of this multi-vector attack. Learn statistics on each industry that was attacked and get insight on how to best protect your network in the future.
Posted: 29 Sep 2016 | Published: 31 Aug 2016

Akamai

It’s Not You, It’s Me: Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: Discover what specific security responsibilities belong to you and your provider, the latest cloud security threats, and 7 cloud security best practices.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Alert Logic

The Rising Face of Cyber Crime Ransomware
sponsored by BitSight
WHITE PAPER: Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Download the latest BitSight Insight report to find out how ransomware affects each industry, and what organizations can do to prevent it.
Posted: 28 Sep 2016 | Published: 31 Aug 2016

BitSight

Neustar DDOS Attacks & Protection Report: North America & EMEA The Continuous Risk to Digital Brands
sponsored by Neustar
WHITE PAPER: This report encapsulates the survey results of 760 CSOs, CIOs, CTOs and others in IT security. Its purpose is to learn how companies in North America and the EMEA region (Europe, the Middle East, and Africa) encounter and defend against DDoS attacks.
Posted: 28 Sep 2016 | Published: 31 Dec 2015

Neustar

Two-Factor Authentication Protects Health Data
sponsored by VASCO Data Security International
WHITE PAPER: Discover how strong authentication and digital identity management can increase health data security while making it easier for providers to do their work. This paper also explores how patients can use this method to view and download health records from multiple portals while increasing privacy protection.
Posted: 26 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Security Information and Event Management (SIEM) Orchestration
sponsored by Intel Security
WHITE PAPER: This document takes a deep look at one SIEM tool, and examines how it optimizes incident response processes. Explore ways to block threats more effectively, identify compromises, implement quick remediation, and more.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Intel Security

Kona Client Reputation
sponsored by Akamai
WHITE PAPER: Discover the business benefits and operational benefits you can achieve by adding a new, advanced algorithm to your security infrastructure. Profile malicious users before they have a chance to infect your network.
Posted: 26 Sep 2016 | Published: 31 Dec 2015

Akamai

Situational Awareness Monitoring Helps US Government Agency Meet Cybersecurity Requirements
sponsored by Gigamon
WHITE PAPER: This white paper describes how the HHS was able to meet their rigid security requirements in an era of rising malicious cybersecurity threats. Discover how they were able to achieve pervasive visibility of all network traffic across geographically dispersed locations and keep their massive amount of private information safe.
Posted: 26 Sep 2016 | Published: 31 Dec 2015

Gigamon

Harnessing the Power of Metadata for Security
sponsored by Gigamon
WHITE PAPER: Discover how metadata, rich in context, can help analyze security metrics faster to enable rapid threat remediation.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

Gigamon

TAG Cyber Report: 2017 Security Annual – Vol. 1
sponsored by Digital Guardian
WHITE PAPER: This report provides CISO team members with detailed technical and architectural guidance based on fifty specific controls that support the reduction of cyber risk. It's a practical handbook and reference guide for the cyber security professional.
Posted: 22 Sep 2016 | Published: 31 Aug 2016

Digital Guardian

The Power of Precise Threat Intelligence: Which SecureWorks service is right for me?
sponsored by SecureWorks
WHITE PAPER: Creating meaningful threat intelligence requires specialized tools and expertise that go well beyond simple alerts and content searches. Discover hot to achieve this level of expertise within this short white paper. You'll gain a greater visibility into the deepest part of your network and better understand malware and the actors behind it.
Posted: 22 Sep 2016 | Published: 31 Aug 2016

SecureWorks

How to Secure Data Access Within the Healthcare Industry
sponsored by VASCO Data Security International
WHITE PAPER: Access this white paper to learn the changing role of technology within the health sector and why healthcare organizations continue to experience major data breaches. Discover best practices to help your organization integrate and adopt security without compromising the patient experience.
Posted: 22 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Deriving Value from the Technical Security Test
sponsored by SecureWorks
WHITE PAPER: Uncover a guide for your questions as you get into the process of choosing the right provider to meet your specific security testing needs. Learn key considerations that must be implemented in the selection process for technical testing providers.
Posted: 21 Sep 2016 | Published: 31 Aug 2016

SecureWorks

The Changing Workforce: Automation & the Role of Ex-Hackers
sponsored by Radware
WHITE PAPER: The wave of automation is forcing companies to think differently about how they structure their security resources. Learn what your peers are doing to keep the network impermeable, including employing ex-hackers, automating security models, and more.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Radware

How to Protect Data from Ransomware
sponsored by Dell Software
WHITE PAPER: It can be difficult to recover data that is encrypted by ransomware malware. In this expert guide, discover how to stop ransomware from breaching your network in the first place and backup all of your data.
Posted: 27 Sep 2016 | Published: 22 Sep 2016

Dell Software
1 - 25 of 492 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement