IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Log Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Log Monitoring Reports
 
How CISOs Tackle Insider Threat Data Protection
sponsored by Forcepoint
WEBCAST: Threats from within are a high priority for CISOs; even your best employees can put your data at risk. What technologies can help protect you and your employees? Hear how a real-world CISO plans, implements, and manages an insider threat program.
Posted: 30 Jun 2016 | Premiered: May 1, 2016

Forcepoint

Online Phishing
sponsored by Navex Global
WEBCAST: Through real world examples and quizzes throughout, learn how to spot phishing scams and enable your employees to do the same. Protect your organization from illegitimate emails with this short, interactive resource.
Posted: 20 Jul 2016 | Premiered: Jun 1, 2016

Navex Global

Assessing Cybersecurity Risk in a Breached World
sponsored by Infocyte
WHITE PAPER: It's imperative you include regular compromise assessments as part of your information and IT risk management strategy. Enable your operations team to catch what prevention and monitoring technologies miss, and learn how to best mitigate the possible damage that can be caused from persistent compromises before hackers make their move.
Posted: 06 Jul 2016 | Published: 01 Jun 2016

Infocyte

Top 10 Zero-Day Exploits of 2015
sponsored by Palo Alto Networks
WHITE PAPER: This paper provides a list of the Top 10 Zero-Day Exploits of 2015 and offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns. It also provides additional details on three particularly effective zero-day exploits in brief case studies.
Posted: 30 Jun 2016 | Published: 01 May 2016

Palo Alto Networks

Incident Response Team: Transform Your IR Team From Reactive to Proactive
sponsored by ThreatConnect
WHITE PAPER: Discover how your IR team can become faster and more effective at protecting your network. Unite your people, processes, and technologies across your organization to eliminating barriers between the systems that used to slow you down.
Posted: 06 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

Defeating the Threat Within
sponsored by Forcepoint
WHITE PAPER: Your critical data can be stolen by someone who interacts with your network daily. You need the right plan before it happens. Learn about the new wave of insider threats and start planning now.
Posted: 30 Jun 2016 | Published: 01 May 2016

Forcepoint

Mobile Threat Prevention Behavioral Risk Analysis
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover what it means to have an advanced approach to comprehensive mobile security. Learn how you can closely monitor new or updated apps installed on the device, use app reputation to eliminate malware false-positives, and more.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Check Point Software Technologies Ltd.

The Top Five Requirements for Secure Enterprise File Sync and Sharing
sponsored by Citrix
WHITE PAPER: Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.
Posted: 24 Jun 2016 | Published: 01 May 2016

Citrix

451 Research: Vormetric Enters Encryption Gateway Fray with Latest Extension to Its Platform Strategy
sponsored by Vormetric
ANALYST REPORT: This 451 Research report offers a current analysis of Vormetric's recent product releases, including the solutions offering tokenization with dynamic data masking, Teradata support, and cloud encryption gateway. The report also offers analysis of the Vormetric Data Security Platform strategy
Posted: 29 Jul 2016 | Published: 01 Jun 2016

Vormetric

Secure Enterprise Email on Mobile Devices
sponsored by IBM
WHITE PAPER: Discover the key to securing and controlling enterprise emails on mobile devices in a BYOD environment. Uncover the value of separating personal and corporate data on phones and tablets, using a single sign-on for authentication, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement