IT Management  >   Systems Operations  >   Security  >   Security Management  >  

SIEM

RSS Feed    Add to Google    Add to My Yahoo!
SIEM Reports
 
Security Breaks DevOps – Here’s How to Fix It
sponsored by CloudPassage
WHITE PAPER: This webcast presents the key ingredients your security strategy needs in order to secure and accelerate DevOps.
Posted: 20 Jan 2016 | Published: 14 Jul 2015

CloudPassage

Gartner: Data Loss Prevention Magic Quadrant for Content-Aware Data Loss Prevention
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to see how content-aware DLP solutions incorporate sophisticated detection techniques to help businesses address their more critical data protection requirements.
Posted: 26 Jan 2016 | Published: 12 Dec 2013

Digital Guardian

Security for Virtual Machines
sponsored by TechData Corporation
WHITE PAPER: In this white paper you will discover how you can achieve outstanding, multi-layered, granular protection for your VDI and virtual server environments with little impact on responsiveness on virtualized workloads.
Posted: 28 Jan 2016 | Published: 14 Dec 2015

TechData Corporation

Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This white paper defines Big Data Security and its underlining security analytics and malware analysis technology.
Posted: 04 Feb 2016 | Published: 31 Dec 2015

Blue Coat Systems

Making Risk Management More Effective with Security Ratings
sponsored by BitSight
WHITE PAPER: This white paper talks about some of the security risk management approaches organizations have taken as well as new approaches to othe growing problems.
Posted: 04 Feb 2016 | Published: 30 Apr 2014

BitSight

FedRAMP for SaaS
sponsored by Coalfire
WEBCAST: Watch this webcast to discover how FedRAMP can increase your confidence in the security of your cloud solutions.
Posted: 26 Jan 2016 | Premiered: Mar 18, 2015

Coalfire

Prelert Analytics vs Holt-Winters Filtering
sponsored by Prelert
WHITE PAPER: In this technical brief, explore the comparison between two real time series data modeling and anomaly detection strategies. Learn how anomaly detection on real time series data requires specific modeling capabilities and review the results obtained with each approach.
Posted: 01 Feb 2016 | Published: 30 Dec 2015

Prelert

Maastricht University Saves Weeks of Manpower and Delivers Improved Services
sponsored by Splunk
WHITE PAPER: Access this white paper to discover how you can proactively secure your network against phishing attacks.
Posted: 21 Jan 2016 | Published: 06 Jan 2016

Splunk

What Story Does Your IT Security Tell?
sponsored by Prelert
DATA SHEET: In this resource, you will discover how to analyze log data and locate anomalies in order to combat advanced cyberthreats with an anomaly detection application. Access this resource to apply behavioral analytics to any data resource—including Windows event logs, DNS logs, and firewall logs.
Posted: 28 Jan 2016 | Published: 31 Dec 2015

Prelert

SIEM Solution Report: How Did Yours Score?
sponsored by IBM
WHITE PAPER: This report looks at 13 SIEM tools and identifies each one's strengths and cautions. Access now to determine if your ideal SIEM strategy is a niche player, a visionary, a challenger, or a leader.
Posted: 25 Jan 2016 | Published: 20 Jul 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement