IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security Information Reports
 
Maintain Compliance with Around-the-Clock Monitoring and Threat Management
sponsored by Hewlett-Packard Enterprise
CASE STUDY: It's challenging to protect your organization quickly and accurately when you're overwhelmed by security alerts. Discover how a major North American hospital reduced its exposure to compliance problems by leveraging managed security services to enable around-the-clock monitoring of security logs.
Posted: 02 Mar 2017 | Published: 29 Feb 2016

Hewlett-Packard Enterprise

Managing Cybersecurity Risk: How Directors and Corporate Officers Can Protect Their Businesses
sponsored by BAE Systems
WHITE PAPER: Go beyond simple risk management by implementing cybersecurity practices designed not only to prevent breaches but anticipate the damage and recover from attacks. Discover how to bolster endpoint security and data loss prevention by identifying potential attackers to improve your organization's threat awareness and put the right tools in place.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

BAE Systems

You've Been Compromised - Now What?
sponsored by Dell SecureWorks
WHITE PAPER: This white paper provides three critical questions you must answer and decisively act upon at the first signs of a security breach. Discover these questions to ensure your organization can protect itself from costly security incidents.
Posted: 08 Mar 2017 | Published: 30 Dec 2016

Dell SecureWorks

Mitigate the Harm a Lack of Security Professionals Can Do
sponsored by Armor
WHITE PAPER: Cybersecurity is a tricky subject in today's threat landscape. Learn how to gain a significant cybersecurity advantage, providing your organization with proactive vulnerability scanning, continuous patching and monitoring, dedicated compliance expertise, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Armor

How Well Do You Know Your Customers?
sponsored by BAE Systems
WEBCAST: This webcast explores how KYC and anti-money laundering (AML) technology fit into your institution by viewing the organization in terms of a financial crime and risk management framework. Discover how to go beyond initial customer onboarding to implement ongoing risk management.
Posted: 07 Mar 2017 | Premiered: Mar 7, 2017

BAE Systems

Six Steps to a Better Security Strategy
sponsored by Armor
WHITE PAPER: In this Forrester report, discover 6 straightforward steps you can take immediately to start building a truly business-savvy security strategy.
Posted: 08 Mar 2017 | Published: 22 Jan 2016

Armor

How to Use Log Management in Incident Response
sponsored by Logentries
WEBCAST: Learn the benefit of high synergy between IT incident response and log management systems. See as experts dive into 2 use cases for leveraging logs in incident response.
Posted: 15 Mar 2017 | Premiered: Mar 15, 2017

Logentries

SonicWall Annual Threat Report: What Are Cyber Criminals Up To, and Is Your Company At Risk?
sponsored by SonicWall
RESEARCH CONTENT: What are cyber criminals up to? It's important to know where things stand when it comes down to the security of your organization. Inside, discover results from SonicWall's Annual Threat Report, including where cyber criminals have shifted their focus, how IoT devices are affecting the online security landscape, and much more.
Posted: 07 Mar 2017 | Published: 07 Feb 2017

SonicWall

The Potential ROI of Fraud Detection and Prevention Tools
sponsored by BAE Systems
RESEARCH CONTENT: This Forrester Total Economic Impact report examines an analytical platform that provides organizations with the tools to detect, investigate, and prevent insurance fraud while minimizing the impact to genuine customers. Discover the potential ROI of this fraud detection and prevention platform, deployed either on-premise or in the cloud.
Posted: 03 Mar 2017 | Published: 31 May 2016

BAE Systems

Mobile device Management - Keep up with your mobile workforce
sponsored by Snow Software
VIDEO: Discover a device manager that has combined EMM and software asset management to minimize the impact of mobility on the service desk and deliver a safe environment for employees to use sensitive information and apps on mobile devices.
Posted: 20 Mar 2017 | Premiered: 26 Nov 2015

Snow Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement