IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Information Management White Papers (View All Report Types)
Breach Detection Systems Comparative Report
sponsored by Trend Micro
WHITE PAPER: This white paper presents the results of a comparative security test between the top breach detection systems to aid you when crafting your network security strategy.
Posted: 28 Sep 2015 | Published: 02 Sep 2015

Trend Micro

Network Vulnerabilities Defended: Fighting Today’s Advanced Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper reveals the three phase strategy to defending your network against determined cybercriminals.  Read on to take a look into hackers' minds and learn how to improve data protection.
Posted: 04 May 2015 | Published: 22 Apr 2015

Fortinet, Inc.

Achieving Multi-Tiered Security
sponsored by Gigamon
WHITE PAPER: This white paper discusses the kind of multi-tiered security strategy that will most effectively keep your enterprise safe.
Posted: 14 Apr 2015 | Published: 14 Apr 2015


Practical Threat Management and Incident Response for the Small-to-Medium-Sized Enterprise
sponsored by AlienVault
WHITE PAPER: In this white paper, examine several security controls and how they can change the outcome of an attack. Continue reading for industry advice for evaluating today's security control options.
Posted: 17 Nov 2015 | Published: 18 Jun 2014


SIEMplifying Security Monitoring for SMBs
sponsored by AlienVault
WHITE PAPER: This white paper discusses the unique SIEM challenges SMBs face. Access this resource now to learn how you can get the most out of your SIEM despite limited resources.
Posted: 22 Oct 2015 | Published: 22 Oct 2015


Turning the Tables on Cyber Criminals - Kill Chain eBook
sponsored by Proofpoint, Inc.
WHITE PAPER: Delve into the minds of hackers and learn how they plan, launch, and monitor attacks against security systems. Learn the 7 steps of the kill chain and how to use each phase to take the advantage over cybercriminals and stop them in their steps.
Posted: 22 Oct 2015 | Published: 13 Jul 2015

Proofpoint, Inc.

Case Study: Overcoming the Challenges of K-12 Security
sponsored by AlienVault
WHITE PAPER: This case study describes how Council Rock School District, a large district with a tight budget, found a unified security solution that met its needs.
Posted: 27 Oct 2015 | Published: 27 Oct 2015


October 2015: DDoS Attacks & Protection Report: North America & EMEA
sponsored by Neustar®
WHITE PAPER: This white paper examines DDoS attacks within the last 6 months and reveals key information to learn how to protect your network against determined cybercriminals. View now to learn why you should worry more about low-and-slow attacks rather than a tidal wave DDoS attack.
Posted: 12 Oct 2015 | Published: 29 Sep 2015


Critical Capabilities for Security Information and Event Management
sponsored by IBM
WHITE PAPER: This Gartner report reviews fifteen different SIEM offerings, ranking them according to use cases and revealing which products work best in different environments.
Posted: 02 Sep 2015 | Published: 25 Jun 2015


Study on Cybercrime's Cost to Business
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Hewlett Packard Enterprise
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement