IT Management  >   Systems Operations  >   Security  >   Security Management  >  

SIEM

RSS Feed    Add to Google    Add to My Yahoo!
SIEMReports
 
How to Use Threat Intelligence with SIEM Products
sponsored by LogRhythm, Inc.
EGUIDE: This expert e-guide will teach you how to use security information and event management to protect your organization from evolving threats.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

LogRhythm, Inc.

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

SIEM missteps? Tips to help you move forward: Presentation Transcript
sponsored by LogRhythm, Inc.
PRESENTATION TRANSCRIPT: Download this expert presentation transcript now to learn about key pitfalls you must avoid to find value in your security information and event management deployment at different maturity levels.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

LogRhythm, Inc.

Protect Your Organization by Thinking Like an Attacker
sponsored by Core Security Technologies
VIDEO: Download this exclusive video now to learn about a solution that helps you think like an attacker while consolidating, prioritizing, and normalizing threats.
Posted: 10 Dec 2014 | Premiered: 10 Dec 2014

Core Security Technologies

Security Analytics and Intelligence Survey 2014
sponsored by Hewlett-Packard Company
WHITE PAPER: This survey of 350 IT professionals explores how IT security teams use security analytics and intelligence to help detect cyber attacks.
Posted: 12 Nov 2014 | Published: 15 Oct 2014

Hewlett-Packard Company

Delivering Compliance, Security and Operations Intelligence
sponsored by LogRhythm, Inc.
CASE STUDY: This exclusive case study explores the security solution a theater went with to protect the information of its customers and employees.
Posted: 06 Nov 2014 | Published: 14 Sep 2014

LogRhythm, Inc.

2014 Cost of Cyber Crime Study
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Hewlett-Packard Company

A new look at Vulnerability Management
sponsored by TechTarget
RESOURCE: Does your list of security vulnerabilities seem overwhelming? Visualisation in VM can be an essential tool in making critical issues apparent. Security Visualisation serves as a guideline of how to generate a visual representation of a dataset. Download this guide to get expert advice on how to generate a security visualization plan.
Posted: 24 Oct 2014 | Published: 18 Mar 2014

TechTarget

Closing the Biggest Hole in Web Application Delivery
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper explores a strategy for closing the biggest hole in web application delivery.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

CA Technologies.

Deliver Secure New Business Services
sponsored by CA Technologies.
WHITE PAPER: This informative guide explores how you can deliver secure business services and improve customer experience.
Posted: 23 Jun 2014 | Published: 31 Dec 2013

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement