IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information and Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Information and Event Management White Papers (View All Report Types)
 
Cyber Risk Report - Year in Review
sponsored by SurfWatch Labs
WHITE PAPER: This white paper provides high-level insight on both what cybercriminals are targeting and how they operated over the course of 2015. Learn about the evolving tactics used and how they are impacting business.
Posted: 29 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Beware the Invisible Cybercriminals: Cyberespionage and Your Business
sponsored by Kaspersky Lab
WHITE PAPER: Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don't get caught in the crossfire, read our special report and find out more on cybercriminal techniques, common exploited vulnerabilities and more.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Kaspersky Lab

Advanced Threat Protection Buyer's Guide
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper helps you assess your current security posture against a baseline set of requirements. Access now to ensure you're using the right solution set to fit your organization.
Posted: 27 Apr 2016 | Published: 01 Mar 2016

Fortinet, Inc.

Executive_Summary_DefendAgainstTheUndetected
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, you'll discover why you network must have a comprehensive internal and external solution designed to protect your perimeter, your core, your endpoint and everything else in-between. Access now to learn how you can more effectively detect, prevent and remediate harmful actors.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Proving Change in Business Critical Environments
sponsored by Ixia
WHITE PAPER: This white paper shows you how to properly test your product to meet the challenges you're responsible for. Learn how to test your project end-to-end to ensure your network can handle a new application rollout and to make sure protocols are handled properly to the lowest level.
Posted: 04 May 2016 | Published: 01 Mar 2016

Ixia

MIMIX Availability: The easy way to protect the availability of even the most complex IBM i environments
sponsored by Vision Solutions
WHITE PAPER: In this white paper, you will learn about a simple, yet robust protection platform that efficiently backs up business applications in the event of a production server failure. Access now for 24/7 availability and storage of all your organization's application data.
Posted: 13 Apr 2016 | Published: 31 Jan 2016

Vision Solutions

Securing Real-Time Mobile Communications
sponsored by Mitel Networks Limited
WHITE PAPER: This white paper offers contemporary real-time communications services that are secured end-to-end. Allow employees to communicate remotely through any device using strict identity management tools that ensure your information won't be sent to anyone without proper authorization.
Posted: 04 May 2016 | Published: 01 Apr 2016

Mitel Networks Limited

Cyber Dwell Time and Lateral Movement
sponsored by Forcepoint
WHITE PAPER: Today's organizations should not only focus on keeping hackers out, but also remediating damages once a breach occurs. This white paper shows you how to best deal with cyber attackers once a breach happens and how to keep attackers afraid to come back.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Forcepoint

Next-Generation Endpoint Security Market Sizing and Forecast 2016–2020
sponsored by Carbon Black
WHITE PAPER: This EMA research report provides "beyond the surface" insight on variety of enterprise-capable solution providers. Access this report now and learn about research focused on solution providers providing proactive next-generation endpoint security services covering prevention, detection and response.
Posted: 29 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Information Sharing Defeats Data Security Threats
sponsored by Anomali
WHITE PAPER: This white paper teaches you about information sharing to quell security problems. Learn how to share information with trusted peers adhere to standards and integrate ith popular security software. Access now to enable information sharing that best suits your business' needs.
Posted: 04 May 2016 | Published: 01 Apr 2016

Anomali
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement