IT Management  >   Systems Operations  >   Security  >  

Management of Security

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security Reports
InfoSec Monitoring & Analytics in the Age of IoT and Digital Transformation
sponsored by Symantec Corporation
WEBCAST: In this webcast, an experienced security professional discusses how you can integrate monitoring and analytics into your security strategy to better defend against advanced threats.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015

Symantec Corporation

State of Security Operations: The 2015 Report on Cyber Defense Maturity
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This report brings you the latest information on the capabilities of today's security operations centers and how they need to improve.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

Hewlett Packard Enterprise

Smart Log Monitoring and Analysis: The Key to Security Success
sponsored by LogRhythm, Inc.
EGUIDE: This expert guide discusses how you can create a strategic log monitoring and analysis program that won't get in the way of your users' privacy.
Posted: 18 Nov 2015 | Published: 18 Nov 2015

LogRhythm, Inc.

Put a Stop to Sophisticated DDoS Attacks
sponsored by Akamai
WHITE PAPER: This white paper discusses how you can prevent DDoS attacks and keep your organization's online presence secure and available.
Posted: 19 Nov 2015 | Published: 31 Dec 2014


Identification and Credentialing: Secure and Verify Identity with Biometrics
sponsored by Unisys
WHITE PAPER: This white paper highlights an identity and access management solution that utilizes biometrics. Learn how to implement a security architecture that grants access based on workflow, biometric types, and hardware and software vendors.
Posted: 06 Nov 2015 | Published: 30 Jun 2015


Security Has Failed Us - But it's not Too Late
sponsored by Unisys
VIDEO: Watch this brief video as security solutions expert Tom Patterson explains the failures of the security industry and how they've worsened due to new threats and environments. Tune in and discover the surprising way to overcome these failures.
Posted: 23 Nov 2015 | Premiered: 09 Nov 2015


Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this white paper to discover why security intelligence is so important in today's threat environment and to learn how to implement it in your organization.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

LogRhythm, Inc.

Leading Life Sciences Security
sponsored by Unisys
RESOURCE: This year life science companies are starting to work together in three key areas to better defend themselves from ever increasing threats. Access this blog post now to uncover what three areas your life sciences business should be focusing on to increase security. Read on to develop your own strategy for adopting these security best practices.
Posted: 09 Nov 2015 | Published: 09 Mar 2015


Case Study: Major Financial Institution Defends against High Volume SQL Injection
sponsored by Akamai
WHITE PAPER: Access this resource to learn how a global financial firm kept valuable data safe from an SQL injection attack.
Posted: 09 Nov 2015 | Published: 09 Nov 2015


A Strategic Approach to Combatting Security Threats Featuring ESG Analyst Jon Oltsik
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This paper discusses how organizations can take a more strategic approach to threat management by moving to a tightly integrated and centrally managed defense-in-depth architecture.
Posted: 12 Nov 2015 | Published: 31 Oct 2015

Check Point Software Technologies Ltd.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement