IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management White Papers (View All Report Types)
51 - 75 of 449 Matches Previous Page  |  Next Page
Move to the cloud with confidence.
sponsored by Verizon
WHITE PAPER: This white paper shows you how to safely connect with a variety of cloud providers to alleviate possible cloud apprehensions. Access now to learn more about how to easily, reliably and securely move to the cloud.
Posted: 10 May 2016 | Published: 31 Dec 2014

Verizon

Comprehensive Security for Cloud-based Email
sponsored by Symantec Corporation
WHITE PAPER: Understand today's biggest cloud threats – including overlooked security issues lurking in commonly used cloud-based productivity apps – and accurately assess how much protection your cloud needs.
Posted: 10 May 2016 | Published: 31 Dec 2015

Symantec Corporation

Understand Pass-the-Hash (PtH) Attacks and Mitigate the Risk
sponsored by Dell Software
WHITE PAPER: Go in depth and learn what a hash is and how a PtH attack can greatly impact your network. Learn how to mitigate these types of attacks with Privileged Password Manager and Privileged Session Manager.
Posted: 09 May 2016 | Published: 31 Dec 2014

Dell Software

Not all Next-Gen Firewalls are created equal
sponsored by Barracuda Networks
WHITE PAPER: Learn how to centrally control every aspect of your firewalls to maintain even data flow and security throughout your network. Access now learn to more about a secure communication backbone that provides all the deep packet inspection and threat mitigation you need.
Posted: 09 May 2016 | Published: 01 Apr 2016

Barracuda Networks

SimpliVity Hyperconverged Infrastructure: Lab Validation Report
sponsored by SimpliVity
WHITE PAPER: In this white paper, you will discover hyperconverged infrastructure that creates backups quickly, efficiently and securely even across data centers. Access now to learn how to backup and restore important files with just two mouse clicks.
Posted: 09 May 2016 | Published: 01 Feb 2016

SimpliVity

Unlock the Key to Repel Ransomware
sponsored by Kaspersky Lab
WHITE PAPER: As cybercriminals realize that victims are often willing to pay for the release of their precious files, the prevalence of ransomware and its variations are on the rise. Learn about the common trends in this type of cybercrime and recommendations to help your organization avoid victimization.
Posted: 09 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Bolster email security in Office 365 deployments
sponsored by ZixCorp
WHITE PAPER: Organizations looking to ensure the success of their Office 365 migration are carefully planning every aspect of their projects to reduce risk. Learn why email encryption capabilities should not be overlooked in those plans.
Posted: 09 May 2016 | Published: 01 Apr 2016

ZixCorp

McAfee Labs Threats Report
sponsored by Intel Security
WHITE PAPER: Access this in-depth report from McAfee Labs to learn more about the rise of cyber threat intelligence—including findings from a recent survey of IT professionals—as well as what you need to know about the increasingly prevalent threat of Adwind Java-based malware.
Posted: 09 May 2016 | Published: 31 Mar 2016

Intel Security

How Sarbanes-Oxley Act (SOX) Compliance is Impossible without Privileged Management
sponsored by Dell Software
WHITE PAPER: This white paper addresses IT security compliance from an auditor's perspective. Access now to help your organization achieve and prove compliance with other security mandates as well.
Posted: 06 May 2016 | Published: 31 Dec 2015

Dell Software

Cost of Data Breach – Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: This report examines two factors that affect the financial consequences of a data breach. The first is executive involvement security strategy and response to data breaches. The second is the purchase of cyber insurance to mitigate the cost of a data breach. Access now to learn how to best mitigate cyber breaches and protect reputation.
Posted: 06 May 2016 | Published: 01 May 2015

IBM

Case Study: Enable Care Providers While Protecting Patient Data
sponsored by Digital Guardian
WHITE PAPER: Follow St. Charles Health System's path from risk assessment to remediation of their problems using a data loss prevention technique to monitor their entire network to ensure no important information was being mishandled.
Posted: 06 May 2016 | Published: 01 Apr 2016

Digital Guardian

The 5 Characteristics of an Intelligence-Driven Security Operations Center
sponsored by Intel Security
WHITE PAPER: Access this report by Gartner to examine the challenges traditional security operations centers face, and how you can build an intelligence-driven one that can handle today's dynamic threat and risk environment.
Posted: 06 May 2016 | Published: 15 Nov 2015

Intel Security

Deliver reliable, fast, and secure networks for improved APM
sponsored by Ixia
WHITE PAPER: How can an intelligent visibility framework provide smarter application performance monitoring and enhance security tools? Get an overview of the benefits of these tools and what's needed to create a fast, reliable and secure network for greater customer satisfaction.
Posted: 06 May 2016 | Published: 01 Mar 2016

Ixia

Security that Plays Well with Others
sponsored by Intel Security
WHITE PAPER: As cyberattacks increase in volume and sophistication, organizations need to present a unified coordinated defense. Discover how an open, integrated security architecture can help you coordinate your siloed legacy security products and simplify the threat defense lifecycle.
Posted: 06 May 2016 | Published: 31 Dec 2015

Intel Security

Securosis: SIEM Kung Fu
sponsored by Intel Security
WHITE PAPER: Learn how to make the most of your existing security information and event management (SIEM) product or service as we reveal real-world use cases as to why SIEM still matters (although no longer requires a ninja DBA to help with it) and how your current security monitoring platform can be leveraged to enable faster detection and prevention.
Posted: 06 May 2016 | Published: 21 Apr 2016

Intel Security

ESG Lab Validation Report: McAfee Next Generation SIEM
sponsored by Intel Security
WHITE PAPER: Access this ESG lab validation report to discover unbiased answers and expertise as to how a holistic security approach, which can leverage multiple interconnected security solutions as a unified ecosystem, might be the answer to today's frustrating IT security dilemmas.
Posted: 06 May 2016 | Published: 30 Apr 2015

Intel Security

Understanding Cyberthreat Motivations to Improve Defense
sponsored by Intel Security
WHITE PAPER: Find out why you must add cyber-criminal motivation to your threat taxonomy in order to understand what causes a threat agent to commit harmful acts. Read on to discover in detail the elements of this new parameter and how this crucial understating of the hacker's mind can help protect your entire infrastructure.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

Disrupting Targeted Attacks Solution Guide
sponsored by Intel Security
WHITE PAPER: Reduce complexity, response time and operational costs while simultaneously improving your security posture in the face of growing risks. Access now and find out how to synthesize your IT operations and security controls to form an agile, increasingly automated (and rock-solid) security architecture.
Posted: 05 May 2016 | Published: 01 Apr 2016

Intel Security

CISO Strategies to Fight Cybercrime
sponsored by IBM
WHITE PAPER: This report outlines how CISOs are stepping up cybersecurity efforts to focus on addressing one of the most prevalent underlying issues globally – a programmatic focus on compliance instead of risk-based outcomes. Access now to learn what strategies security leaders are using to transform their organizations.
Posted: 05 May 2016 | Published: 01 Oct 2015

IBM

The top four cybercrime trends
sponsored by IBM
WHITE PAPER: This report highlights four key cybercrime trends that were observed throughout 2015, including an increase in "onion-layered" security incidents, ransomware attacks and insider threats. Access now to figure out how your organization can easily find the footprints attackers leave behind.
Posted: 05 May 2016 | Published: 31 Dec 2015

IBM

What is Advanced Hybrid Security?
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Are you prepared for complex attacks on your network? Learn how advanced hybrid security solutions meet you where you are and get you to the level of security you need.
Posted: 05 May 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Advancing Cyber-Security Measures Inside
sponsored by VMware
WHITE PAPER: In this infographic, discover how to secure your network and data center from the inside and bolster your existing perimeter defenses.
Posted: 05 May 2016 | Published: 01 Apr 2016

VMware

Security Analysis: Mobile Dating Apps Vulnerabilities and Risks to Enterprises
sponsored by IBM
WHITE PAPER: Why should you be paying attention to personal apps used on corporate devices? Get an understanding of which applications are vulnerable to attacks and take action to blacklist at-risk applications from running on a device with corporate data.
Posted: 04 May 2016 | Published: 01 Feb 2015

IBM

This is How We Do It: A Financial Giant's Threat Intel Success Story
sponsored by ThreatConnect
WHITE PAPER: This white paper tells you the story of a Fortune 100 services organization that integrated its security infrastructure, increased the efficiency of its cybersecurity team, and thereby identified attacks before they occurred. Access now to learn how you can streamline and improve your threat intelligence program.
Posted: 04 May 2016 | Published: 01 Apr 2016

ThreatConnect

Securing Real-Time Mobile Communications
sponsored by Mitel Networks Limited
WHITE PAPER: This white paper offers contemporary real-time communications services that are secured end-to-end. Allow employees to communicate remotely through any device using strict identity management tools that ensure your information won't be sent to anyone without proper authorization.
Posted: 04 May 2016 | Published: 01 Apr 2016

Mitel Networks Limited
51 - 75 of 449 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement