IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management White Papers (View All Report Types)
26 - 50 of 178 Matches Previous Page  |  Next Page
Understanding the Data Security Risk – New Findings Revealed
sponsored by IBM
WHITE PAPER: In this webcast, discover how to defend the 4 types of data hackers want to steal using a simple framework as a foundation for your security strategy. View now to learn more.
Posted: 11 Mar 2015 | Published: 04 Feb 2015

IBM

Closing the Web App Data Security Gap
sponsored by IBM
WHITE PAPER: In this white paper, you will learn about one security platform that monitors, tracks, and reports on user activities accesing critical applications.
Posted: 09 Mar 2015 | Published: 08 May 2013

IBM

The 5 Challenges of Data Security
sponsored by IBM
WHITE PAPER: In this white paper, learn the five challenges regarding data security today. Additionally, read on to uncover the five steps to strengthening your data security strategy.
Posted: 09 Mar 2015 | Published: 10 Sep 2014

IBM

Top 10 IoT Security Challenges
sponsored by Axway
WHITE PAPER: In this white paper, learn the top ten security considerations for IoT. Read on now and explore two IoT security scenario case studies and their respective solutions.
Posted: 18 Feb 2015 | Published: 04 Dec 2013

Axway

The Current State of Security Operations Around the World
sponsored by Hewlett-Packard Company
WHITE PAPER: This report summarizes the results of a recent HP assessment of the capabilities of 87 security operations centers worldwide. Read on to learn the latest trends in security defenses and operations, the attributes of the most effective organizations, and much more.
Posted: 12 Feb 2015 | Published: 30 Jan 2015

Hewlett-Packard Company

Your Guide to Choosing a Next Generation Firewall to Combat Today's Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource helps you understand the next generation firewall (NGFW), and how to choose the best solution to combat today's threats.
Posted: 01 Feb 2015 | Published: 19 Nov 2014

Hewlett-Packard Company

A Smarter Solution to Malware Prevention
sponsored by Webroot
WHITE PAPER: Short Description: Download this exclusive white paper now to learn more about the threats organizations are facing today, the means to combat those threats, and the next-generation of cloud-driven protection.
Posted: 29 Jan 2015 | Published: 18 Nov 2014

Webroot

Complete Breakdown of the Endpoint Security Marketplace
sponsored by Webroot
WHITE PAPER: This exclusive white paper looks at the evolution of the endpoint security marketplace as it fights to limit threats that attack antivirus weaknesses, circumvent security protection, and compromise endpoint systems.
Posted: 29 Jan 2015 | Published: 16 Dec 2014

Webroot

Webroot Secure Anywhere ® Business Endpoint Protection
sponsored by Webroot
WHITE PAPER: This exclusive white paper dives into the changes you must make to your endpoint security to move on from a slow, heavy approach that ultimately causes more problems than it solves.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Webroot

IBM Endpoint Manager for Lifecycle Management
sponsored by IBM
WHITE PAPER: Download this exclusive white paper now to learn about an endpoint and lifecycle management solution that provides an accurate and comprehensive single source of truth for managing all of your endpoints in a single-server.
Posted: 29 Jan 2015 | Published: 13 Oct 2014

IBM

Protecting Data, Enabling Mobility and Empowering Users: Unified Endpoint Management
sponsored by IBM
WHITE PAPER: Download this exclusive white paper now to learn about how much a breach really costs, how long breaches often go undetected, how to handle the always-connected user, and much more.
Posted: 23 Jan 2015 | Published: 15 Dec 2014

IBM

Protect Your Printer, Protect Your Network
sponsored by Hewlett-Packard Limited
WHITE PAPER: Download this exclusive white paper now to learn about the dangers of unsecured printing and much more.
Posted: 22 Jan 2015 | Published: 16 Jan 2014

Hewlett-Packard Limited

The Problem with Your Threat Intelligence
sponsored by Risk IO
WHITE PAPER: This exclusive white paper explores some common security intelligence mistakes you might be making.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Risk IO

IDC MarketScape Excerpt: Worldwide Managed Security Services 2014 Vendor Assessment
sponsored by IBM
WHITE PAPER: This important white paper answers those questions by evaluating IBM's MSSP offering on service capability across the MSS life cycle, revenue, and geographic presence.
Posted: 21 Jan 2015 | Published: 17 Jun 2014

IBM

5 Secrets and 2 Gotchas of Vulnerability Scanning
sponsored by Risk IO
WHITE PAPER: IT security is the unsung hero of your organization. They stay on top of threats, attacks, and potential exploits to keep you and your company safe every day.
Posted: 21 Jan 2015 | Published: 21 Jan 2015

Risk IO

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: Access this valuable white paper now to learn how to protect high-value assets and provide scalable, cost-effective, integrated security across the entire IT environment and much more.
Posted: 22 Dec 2014 | Published: 08 Jan 2014

IBM

Protecting Corporate Credentials Against Today’s Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores the traditional method of protecting corporate credentials and how you must adapt to today's threat landscape.
Posted: 24 Nov 2014 | Published: 16 Sep 2014

IBM

Protecting Your Business with a More Mature IT Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: Your ability to spot and stop cyber attacks depends on having the right security people, processes, and technology in place. HP Security Intelligence and Operations Consulting has assessed the security programs of dozens of enterprises. The results are concerning--24 percent of companies do not meet minimum requirements for security monitoring.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

Hewlett-Packard Company

The 2014 Global Cost of Cybercrime Study
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative report distills interviews with senior-level IT personnel about the impact of cybercrime on their organizations in 2014 into trends that apply to every enterprise around the world.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

The ESG Cybersecurity Maturity Model
sponsored by Hewlett-Packard Company
WHITE PAPER: Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced.
Posted: 18 Nov 2014 | Published: 22 Oct 2014

Hewlett-Packard Company

10 Steps for Implementing Strong Authentication in your Organization
sponsored by Gemalto
WHITE PAPER: This important whitepaper covers 10 crucial steps you must take to implement strong authentication in your organization.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Protecting your Executives and Important Information from Risk
sponsored by Gemalto
WHITE PAPER: Check out this exclusive whitepaper for an overview of protecting executive-level information and uncover some ways to simplify management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Tackle Inside Threats with Privileged Access Management
sponsored by Gemalto
WHITE PAPER: Download this exclusive whitepaper now to uncover how to manage privileged access and determine who should have what type of access. Also find stats about insider security breaches and more.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Streamline Windows 7 Migration with this Endpoint Manager
sponsored by IBM
WHITE PAPER: Check out this valuable whitepaper now to learn about an endpoint management solution that can consolidate your systems management infrastructure, automate your processes, clear out inefficiencies, and much more.
Posted: 11 Nov 2014 | Published: 11 Jul 2014

IBM

Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies
26 - 50 of 178 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement