IT Management  >   Systems Operations  >   Security  >   Security Management  >  

SIEM

RSS Feed    Add to Google    Add to My Yahoo!
SIEM Reports
 
Akamai’s [state of the internet] Q2 2016 executive review
sponsored by Akamai
RESOURCE: This report shows you statistics based on cybersecurity information gathered from Q2 2016. It's meant to enable businesses and governments to make intelligent, strategic decisions about broadband connectivity and cloud security moving forward.
Posted: 27 Sep 2016 | Published: 31 Aug 2016

Akamai

How to Optimize Your Compliance Processes to Cut Costs
sponsored by Proofpoint, Inc.
RESOURCE: Discover how you can optimize your compliance processes proactively and use the right technology to get the job done efficiently. Gain greater control over audit-readiness to achieve a firmer bottom line.
Posted: 07 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

Buyer's Guide - DAG
sponsored by STEALTHbits
RESOURCE: This white paper will help choose the best available Data Access Governance solution. The information contained within can be used in creating a request for information (RFI) or request for proposal (RFP) and evaluating Data Access Governance products.
Posted: 13 Sep 2016 | Published: 31 Dec 2015

STEALTHbits

Report: The Impact of Security Threats on Business
sponsored by Radware
WHITE PAPER: In the following report, executives underscore just how expensive it is to recover from a cyber-attack. Learn where organizations are continuing to take action despite major revenue losses, and what more can be done.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Radware

BYOD & MDM: Why you’re still at risk – and what you can do about it
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper discover how you can reap the benefits of BYOD and MDM while also keeping your data and devices secure. Also uncover 9 threats that MDM solutions often fail to catch.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Proofpoint, Inc.

Magic Quadrant for Security Information and Event Management
sponsored by IBM
RESEARCH CONTENT: The need for early targeted attack detection and response is driving the expansion of new and existing security information and event management deployments. This report by Gartner examines and compares the top vendors who market and sell SIEM products. Find out the strengths and weaknesses of each vendor so that you can better navigate the market.
Posted: 29 Aug 2016 | Published: 10 Aug 2016

IBM

Why mitigating risk remains difficult: Overview of GigaSECURE Security Delivery Platform
sponsored by Gigamon
VIDEO: Discover how to shift your security strategy from perimeter defenses towards a detect and protect framework gaining greater visibility in the process.
Posted: 23 Sep 2016 | Premiered: 04 Aug 2015

Gigamon

Addressing the Full Attack Continuum (BDA WP)
sponsored by Cisco Systems, Inc.
WHITE PAPER: It's time for a new threat-centric security model that delivers the visibility and control your organization needs. Discover how to reduce the complexity of threat management while gaining continuous control and advanced threat protection across the entire attack continuum. Act smarter and quicker before, during and after an attack.
Posted: 13 Sep 2016 | Published: 31 Dec 2014

Cisco Systems, Inc.

Harnessing the Power of Metadata for Security
sponsored by Gigamon
WHITE PAPER: Discover how metadata, rich in context, can help analyze security metrics faster to enable rapid threat remediation.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

Gigamon

Information Security Consulting Services Report
sponsored by IBM
WHITE PAPER: This Forrester report evaluates the 13 most significant information security consulting service providers against a set of 31 criteria. Uncover how well these consultancies fulfill the criteria and where they stand in relation to each other.
Posted: 30 Aug 2016 | Published: 29 Jan 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement