IT Management  >   Systems Operations  >   Network Management  >   Network Monitoring  >  

Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Event Management Reports
WAN Speak Musings – Volume I
sponsored by
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

E-Guide: Selecting a SIM for midmarket business
sponsored by
EGUIDE: This expert E-Guide discusses the evolvement of SIM tools, differences in deployment processes and top requirements you should consider before making a decision.
Posted: 01 Nov 2011 | Published: 31 Oct 2011

Predictive Security Intelligence for Retail Organizations
sponsored by Q1 Labs, an IBM Company
WEBCAST: This webcast explores how to add a new dimension to security intelligence through risk management. Extend the value of SIEM and Log Management to determine risk levels throughout your network by integrating vulnerability assessment scan results, network behavior analysis and topology, device configurations, policies, and compliance management.
Posted: 24 Feb 2012 | Premiered: Feb 24, 2012

Q1 Labs, an IBM Company

Best Practices for Building a Security Operations Center
sponsored by CA Technologies.
WHITE PAPER: In this paper, we explore the business and technical requirements that organizations must consider when implementing a SOC.
Posted: 27 Dec 2006 | Published: 01 Aug 2006

CA Technologies.

Protecting Information from Insider Threats
sponsored by McAfee.
WHITE PAPER: Company insiders have what outsiders don’t – trust and legitimate access. Any malicious insider has the ability to steal sensitive data and sabotage assets quickly, easily, and with greater stealth than an external attacker. In this paper, explore best practices and the security controls necessary to combat insider threat.
Posted: 30 Jan 2012 | Published: 30 Jan 2012


Orion Network Performance Monitor
sponsored by SolarWinds, Inc.
TRIAL SOFTWARE: Traditional framework solutions are expensive and tough to implement; are difficult to use, maintain and customize; and often impractical for network engineers in mid- to large-sized organizations. Network engineers need affordable, scalable network management solutions that provide immediate visibility into performance of the entire network.
Posted: 14 Jul 2009 | Premiered: 14 Jul 2009

SolarWinds, Inc.

Top 10 - A Guide to Selecting a SIM Solution for Regulatory Compliance
sponsored by ArcSight, an HP Company
WHITE PAPER: This guide has been compiled directly from the experiences of actual customers. These practices should be used as an integral part of your evaluation and selection process
Posted: 25 Jan 2007 | Published: 01 Jan 2007

ArcSight, an HP Company

Continuous Monitoring: Responding to New Threats in More Complex IT Environments
sponsored by Tripwire, Inc.
WHITE PAPER: Governments today are focusing on the practice of continuous monitoring as a means to providing the much needed balance between data access and protection. In this paper, learn more about continuous monitoring, including what is it and why it’s needed, guidelines for implementing it, key capabilities of an effective solution, and more.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Tripwire, Inc.

Worldwide and U.S. Security Services Threat Intelligence 2011–2014 Forecast: Out of the Basement and into the Clouds
sponsored by Vigilant
ANALYST REPORT: With threats becoming more advanced, organizations need new innovative ways to defend against them. View this excerpt from IDC Market Analysis to explore security services threat intelligence market including its current state, how the technology works, key benefits and competitive overview.
Posted: 02 Apr 2012 | Published: 02 Apr 2012


Ponemon Study Finds IT Security Not Prepared for Advanced Attacks
sponsored by Prelert
WHITE PAPER: This white paper examines how security vulnerabilities compile when you ignore your organization's threat intelligence strategy. View now to learn the top network threats and how to detect them faster by enhancing threat intelligence.
Posted: 04 Feb 2016 | Published: 28 Oct 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement