IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management White Papers (View All Report Types)
26 - 50 of 184 Matches Previous Page  |  Next Page
Active Visibility for Multi-Tiered Security
sponsored by Gigamon
WHITE PAPER: Access this white paper to learn how a multi-tiered security strategy can help you effectively deploy the security tools at your disposal.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Gigamon

Rules Of Engagement: A Call To Action To Automate Breach Response
sponsored by Digital Guardian
WHITE PAPER: This white paper delves into why security teams need to automate incident response (IR) plans to defend against dynamic cybercriminal attacks. View now to learn the four steps to developing an automated rules of engagement workflow to combat hackers.
Posted: 14 Apr 2015 | Published: 02 Dec 2014

Digital Guardian

Comprehensive Data Protection Against Insider & Outsider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explores an endpoint focused security strategy to allow protection to travel with the data regardless of location or device.
Posted: 14 Apr 2015 | Published: 25 Mar 2015

Digital Guardian

A Much Needed Cybersecurity Paradigm Shift
sponsored by UnitedLex
WHITE PAPER: This white paper explores why hackers have the upper hand in the battle for data and why organizations need to ramp up security measures, regardless of their current status. View now to gain insight into today's threat landscape.
Posted: 13 Apr 2015 | Published: 08 Oct 2014

UnitedLex

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper to learn about another perspective in POS system security. Read on for an overview of payment card systems and attack methods, as well as how to leverage the Council on CyberSecurity's 20 critical controls to your system's advantage.
Posted: 13 Apr 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

5 Myths Holding Your Security Program Back
sponsored by Digital Guardian
WHITE PAPER: This white paper explores the five common security myths that actually hinder data protection efforts.  View now to learn more.
Posted: 10 Apr 2015 | Published: 25 Feb 2015

Digital Guardian

The State of Threat Intelligence in 2015
sponsored by AlienVault
WHITE PAPER: In this research report, discover how many organizations have successfully implemented threat intelligence and what benefits they're experiencing.
Posted: 08 Apr 2015 | Published: 28 Feb 2015

AlienVault

The Business Value of a Comprehensive All-in-OneData Protection Solution for Your Organization
sponsored by Asigra
WHITE PAPER: Access this white paper to learn how to develop a comprehensive data protection strategy to have transparent visibility and complete control. View now to explore the five common failures of data protection and how to overcome each.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Asigra

Three-Pronged Approach to Improving Physical Security
sponsored by Modulo
WHITE PAPER: View this white paper to discover how to improve the physical protection of data through a three-pronged approach and how people, processes, and technologies can be used to minimize the disruption of information losses. Access now to learn more.
Posted: 02 Apr 2015 | Published: 04 Feb 2015

Modulo

Prepare Yourself for the Cybercrime of 2015
sponsored by FireEye
WHITE PAPER: This 2015 cybercrime report analyzes the threats of 2014 and makes predictions for what you need to be prepared for in the upcoming year.
Posted: 02 Apr 2015 | Published: 31 Dec 2014

FireEye

Gartner - Top Security Trends Takeaways for 2013-14 Webinar Slides
sponsored by Dropbox for Business
WHITE PAPER: These slides outline the state of information security and what you need to know to stay protected.  Read on to uncover insider tips for mitigating risks in the several computing environments.
Posted: 30 Mar 2015 | Published: 29 Aug 2013

Dropbox for Business

Markets and Bounties for Cybercrime Tools and Stolen Data
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper examines the fundamental characteristics of black and grey markets to offer understanding of the current and predicted security threat landscape.
Posted: 27 Mar 2015 | Published: 04 Dec 2014

Juniper Networks, Inc.

Future Security Fortification - The Road Ahead
sponsored by IBM
WHITE PAPER: In this white paper, learn the expected security challenges your company may face in the next 5 years. Read on to uncover tips and best practices for securing your organization against these threats.
Posted: 23 Mar 2015 | Published: 04 Dec 2014

IBM

Shellshock: Best practices for responding to the next vulnerability or Six best practices for successful vulnerability response
sponsored by Alert Logic
WHITE PAPER: In this white paper, uncover the six steps to effective vulnerability response and how to craft your defensive strategy.
Posted: 17 Mar 2015 | Published: 04 Feb 2015

Alert Logic

Top 10 IoT Security Challenges
sponsored by Axway
WHITE PAPER: In this white paper, learn the top ten security considerations for IoT. Read on now and explore two IoT security scenario case studies and their respective solutions.
Posted: 18 Feb 2015 | Published: 04 Dec 2013

Axway

The Current State of Security Operations Around the World
sponsored by Hewlett-Packard Company
WHITE PAPER: This report summarizes the results of a recent HP assessment of the capabilities of 87 security operations centers worldwide. Read on to learn the latest trends in security defenses and operations, the attributes of the most effective organizations, and much more.
Posted: 12 Feb 2015 | Published: 30 Jan 2015

Hewlett-Packard Company

2014 Global Report on the Cost of Cyber Crime
sponsored by Hewlett-Packard Company
WHITE PAPER: View this informative white paper report now to learn what to expect from hackers and how to safeguard your organization. Read on to learn how to assess your security needs and which platforms and systems to choose to mitigate risk by viewing things through the attacker's perspective.
Posted: 02 Feb 2015 | Published: 22 Oct 2014

Hewlett-Packard Company

IBM Endpoint Manager for Lifecycle Management
sponsored by IBM
WHITE PAPER: Download this exclusive white paper now to learn about an endpoint and lifecycle management solution that provides an accurate and comprehensive single source of truth for managing all of your endpoints in a single-server.
Posted: 29 Jan 2015 | Published: 13 Oct 2014

IBM

5 ½ Traits that make a Firewall “Next Gen”
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive white paper offers up five and half features that make a firewall next-generation.
Posted: 29 Jan 2015 | Published: 15 Dec 2014

Fortinet, Inc.

Protecting Data, Enabling Mobility and Empowering Users: Unified Endpoint Management
sponsored by IBM
WHITE PAPER: Download this exclusive white paper now to learn about how much a breach really costs, how long breaches often go undetected, how to handle the always-connected user, and much more.
Posted: 23 Jan 2015 | Published: 15 Dec 2014

IBM

The Problem with Your Threat Intelligence
sponsored by Risk IO
WHITE PAPER: This exclusive white paper explores some common security intelligence mistakes you might be making.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Risk IO

5 Secrets and 2 Gotchas of Vulnerability Scanning
sponsored by Risk IO
WHITE PAPER: IT security is the unsung hero of your organization. They stay on top of threats, attacks, and potential exploits to keep you and your company safe every day.
Posted: 21 Jan 2015 | Published: 21 Jan 2015

Risk IO

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: Access this valuable white paper now to learn how to protect high-value assets and provide scalable, cost-effective, integrated security across the entire IT environment and much more.
Posted: 22 Dec 2014 | Published: 08 Jan 2014

IBM

Protecting Corporate Credentials Against Today’s Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores the traditional method of protecting corporate credentials and how you must adapt to today's threat landscape.
Posted: 24 Nov 2014 | Published: 16 Sep 2014

IBM

Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies
26 - 50 of 184 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement