IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Information ManagementWhite Papers (View All Report Types)
 
Best Practices for Facing Today's Log Management Challenges
sponsored by Alert Logic
WHITE PAPER: This whitepaper discusses key best practices to consider when evaluating automated log management solutions.
Posted: 19 Jun 2014 | Published: 31 May 2012

Alert Logic

Buyer's Guide: SIEM Appliances for 2014-2015
sponsored by LogRhythm, Inc.
WHITE PAPER: Many smaller organizations still face an uphill battle in understanding and sorting through the SIEM vendor options available to them and then choosing the right product for them. This Buyer's Guide lets IT organizations immediately understand what features and functions are available so they can move more quickly to making a buying decision.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

The Next Generation of Data-Driven Security
sponsored by MapR Technologies
WHITE PAPER: In this in-depth white paper, get the facts on how new adaptive algorithms like Machine Learning and Big Data can identify security risks that other outdated techniques simply couldn't.
Posted: 02 Sep 2014 | Published: 30 Jun 2014

MapR Technologies

Testing the Cloud: Definitions, Requirements, and Solutions
sponsored by Ixia
WHITE PAPER: Testing of cloud services has some familiar aspects and some new challenges. Gain an understanding of the risks in the cloud, and how to safeguard your organization.
Posted: 02 May 2014 | Published: 02 May 2014

Ixia

Overcoming Security Breaches and Minimizing the Impact
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

I Have to Trust Someoneā€¦ Don't I?
sponsored by CA Technologies.
WHITE PAPER: This whitepaper outlines the significance of insider threats within every company.
Posted: 25 Jun 2014 | Published: 31 Jul 2013

CA Technologies.

Why Strong Authentication is a Must for All Users
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper provides valuable insight into why strong authentication is essential for all users.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

CA Technologies.

The Critical Incident Response Maturity Journey
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
Posted: 16 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Cyber Security Intelligence Index - Analysis of Cyber Security attack and incident data
sponsored by IBM
WHITE PAPER: IBM Managed Security Services continuously monitors tens of billions of events per day, and this white paper provides you the opportunity to gain insight into what this data really means. Read on to discover the prevalent types of attacks and attackers and the key factors enabling them.
Posted: 24 Jul 2013 | Published: 24 Jul 2013

IBM

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: This white paper introduces a security solution that applies big data capabilities to help organizations to keep pace with today's advanced threats and prevent attacks before they happen.
Posted: 28 Jul 2014 | Published: 31 Jan 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement