IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management White Papers (View All Report Types)
51 - 75 of 470 Matches Previous Page  |  Next Page
End-to-End Visibility: The Foundation of Business-Driven Security
sponsored by RSA
WHITE PAPER: Access this white paper now to learn how to gain visibility into your network and: how logs are not enough when it comes to visibility, a patchwork of point-solutions creates inefficient silos, modern infrastructure compounds blind spots, and more.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

RSA

How to Bridge the Gap in Data Protection and Recovery
sponsored by Veeam Software
WHITE PAPER: In this white paper learn how backup appliances can ensure your data and documents can be recovered in case of loss and drive huge improvements in backup performance and recovery times. Also discover 5 common backup problems and their solutions, as well as 6 things to look for when choosing the right solution to bridge the availability gap.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Veeam Software

Cloud Security: An Example Threat Report
sponsored by Cloudvisory
WHITE PAPER: Learn what cloud threat information is vital to ensure that your enterprise gains the ability to see exactly what is deployed, where, and in real time; instant identification of any out-of-bound usage; a "baseline" state of the cloud deployment for comparison; and more.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Cloudvisory

4 Requirements for a Multi-Cloud Security Approach
sponsored by Cloudvisory
WHITE PAPER: Discover how to replace your traditional network controls with a centralized security policy management platform that can enforce policy through the existing granular, cloud-native security controls of each provider for tighter security with 4 requirements.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Cloudvisory

How to Gain Peace of Mind in the Cloud: Email and Office 365
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how to obtain end-to-end encryption and full privacy in the cloud for your enterprise's email and Office 365. Learn why email remains at risk, what Forrester expert Kelley Mak thinks, and more.
Posted: 10 Apr 2017 | Published: 31 Dec 2016

Hewlett Packard Enterprise

New GDPR Mandates Require Changes to Storage Management Strategies for All Global Enterprises
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: With failure to comply to the GDPR causing a company to be subject to a fine up to €20 million or 4% of total yearly worldwide turnover (whichever is higher) and/or regular audits, planning to pay isn't an option. Access this Gartner report now to learn how to make an actionable plan for GDPR compliance and avoid business-breaking fines.
Posted: 07 Apr 2017 | Published: 26 Aug 2016

Hewlett-Packard Enterprise

Cloud Security Report: How is IT Responding to Today's Threats
sponsored by Cloudvisory
WHITE PAPER: Access this 2017 cloud security spotlight report to learn how organizations are responding to the security threats in the cloud, and what tools and best practices IT security leaders are considering in their move to the cloud, and more.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Cloudvisory

Migration to Exchange Online and Office 365: A Step-by-Step Guide
sponsored by Hewlett Packard Enterprise
WHITE PAPER: For IT administrators who have not been involved in a previous migration to Office 365, there is a steep learning curve. In this step-by-step guide, learn how to select the migration option that makes most sense for your organization to ensure future success and reliable security.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Hewlett Packard Enterprise

Beginner's Guide to Hybrid Cloud Security
sponsored by AlienVault
WHITE PAPER: Learn everything you need for a successful hybrid cloud deployment, including: the cloud security shared responsibility model, how familiar network security challenges persist in the cloud, what new security challenges emerge in the cloud, and a smarter approach to threat detection in hybrid cloud security.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

AlienVault

ISC2 CCSP
sponsored by ISC2
WHITE PAPER: Examine the relationship between IT and the C-suite, as well as the rise of the cloud security professional as an emerging voice within IT and the business.
Posted: 06 Apr 2017 | Published: 06 Apr 2017

ISC2

Your Guide To Today's Cloud Security Adoption Trends
sponsored by ISC2
WHITE PAPER: Security of critical data systems remain a key barrier to adoption of cloud services. In this comprehensive cloud security report discover cloud adoption trends, top cloud security challenges, paths to stronger cloud security, and more.
Posted: 05 Apr 2017 | Published: 05 Apr 2017

ISC2

Evolving Your Business with IoT: Six Steps to a Secure Digital Transformation
sponsored by Appdirect
WHITE PAPER: Discover 6 steps to have your organization undergo a secure IoT digital transformation and enable new types of innovation, creativity, and business models.
Posted: 05 Apr 2017 | Published: 05 Apr 2017

Appdirect

Incident Response Tools Can Help Automate Your Security
sponsored by ModoModo
WHITE PAPER: A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
Posted: 05 Apr 2017 | Published: 30 Mar 2017

ModoModo

How-to Guide: Local, Remote, and Centrally Unified Key Management
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover a unified encrypting data and key management approach with strong access controls that deliver reliable security, ensuring continuous and appropriate availability to keys while supporting audit and compliance requirements.
Posted: 04 Apr 2017 | Published: 04 Apr 2017

Hewlett Packard Enterprise

How Proper Key Management Can Protect Your Data
sponsored by Hewlett Packard Enterprise
WHITE PAPER: With a shift on the threat landscape from simple to sophisticated, ensuring the highest level of reliability, availability, and disaster recovery seems a lofty goal. Discover what role key management can play in critical data protection and business continuity architecture.
Posted: 04 Apr 2017 | Published: 04 Apr 2017

Hewlett Packard Enterprise

Closing the Skills Gap: Leveraging Automated Analytics for Cybersecurity
sponsored by RSA
WHITE PAPER: This white paper explores how to bring automated analytics to bear and bolster your cybersecurity strategy. Overcome the talent shortage and discover how to leverage machine learning, AI, and cognitive capabilities in order to integrate analysis of user behavior patterns into incident detection.
Posted: 04 Apr 2017 | Published: 31 Dec 2016

RSA

The Future of DLP is Automation
sponsored by Ghangor Cloud
WHITE PAPER: Discover the evolution of data loss prevention from its origins to today and shine a light on the future of DLP and the role of automation as a driving factor in its effectiveness.
Posted: 03 Apr 2017 | Published: 30 Mar 2017

Ghangor Cloud

Top Internet of Things Security Concerns
sponsored by Peak10
WHITE PAPER: 70% of IoT ready devices are vulnerable to hackers, and it doesn't look like there's an easy answer to fixing it. Learn what the trajectory towards a secure future state for IoT is shaping up to look like.
Posted: 03 Apr 2017 | Published: 02 Mar 2017

Peak10

Choose the Path to Complete Mobile Security and Productivity
sponsored by MobileIron
WHITE PAPER: Learn how MobileIron and Blackberry match up on vital criteria for enterprise mobility management and how your organization can reap the benefits of pairing with the right one for your particular needs.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

MobileIron

Security: Making a Better Case for Technology in the Classroom
sponsored by Absolute
WHITE PAPER: Explore how educators can ensure the security and efficacy of desktop and mobile devices used by students and staff in K–12 schools while reducing IT administration and management demands and remaining compliant.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

Absolute

Connectivity Options For Microsoft Office 365
sponsored by Zscaler
WHITE PAPER: In September 2016, Microsoft introduced new guidance on best practices for enterprises looking to deploy Office 365. In these guidelines, learn how Office 365 was built to be accessed securely and reliably via a direct Internet connection.
Posted: 31 Mar 2017 | Published: 31 Mar 2017

Zscaler

Mobile Security: The 6 Questions Modern Organizations are Asking
sponsored by Lookout
WHITE PAPER: As Gartner says, "It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used." Learn about six vital mobility areas that enterprises are concerned about, including the lack of visibility, protection, vulnerabilities, and more.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

Lookout

MobileIron and Microsoft's Intune MDM Go Head-to-Head in EMM offering
sponsored by MobileIron
WHITE PAPER: Uncover the key differences between MobileIron and Microsoft's Intune. Learn how to address some of the limitations of both offerings so you can make the best choice to meet mobile security requirements today and down the road.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

MobileIron

Your Guide to Trends in Mobile User Authentication
sponsored by HID
WHITE PAPER: As mobile devices play a greater role in corporate computing and employees become more reliant on them, new security challenges emerge and existing ones become more complex. Access this white paper to discover how the risk of unauthorized access to mobile devices adds new requirements for user authentication.
Posted: 28 Mar 2017 | Published: 24 Mar 2017

HID

Modernizing Your Data Center's Security
sponsored by VMware
WHITE PAPER: The classic approach to data center security is to guard the perimeter and block threats from getting inside—but that's no longer adequate. Learn how micro-segmentation can provide your data center with the security it needs for today's advanced threats.
Posted: 27 Mar 2017 | Published: 30 Sep 2016

VMware
51 - 75 of 470 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement