IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Log Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Log Monitoring Reports
 
7 Elements of Cybersecurity Readiness
sponsored by Cisco Umbrella and Dimension Data
EGUIDE: Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.
Posted: 29 Mar 2017 | Published: 20 Mar 2017

Cisco Umbrella and Dimension Data

Safeguarding Healthcare Information and Leveraging Email Encryption in Your HIPAA Compliance Program
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn how to choose the right email encryption tool for your healthcare organization by keeping these 6 key differentiators in mind as you evaluate potential solutions.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

Hewlett Packard Enterprise

Do You Know Who Owns Your Data?
sponsored by SailPoint Technologies
WHITE PAPER: Access this white paper to learn how to reduce the risk of your unstructured data being used negligently or maliciously, elect the right "data owners" to ensure the security of your data, and more.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

SailPoint Technologies

How to Gain Peace of Mind in the Cloud: Email and Office 365
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how to obtain end-to-end encryption and full privacy in the cloud for your enterprise's email and Office 365. Learn why email remains at risk, what Forrester expert Kelley Mak thinks, and more.
Posted: 10 Apr 2017 | Published: 31 Dec 2016

Hewlett Packard Enterprise

The Ultimate Guide to the CCSP
sponsored by ISC2
WHITE PAPER: Learn how to prepare yourself for getting a CCSP certification, named the #1 cloud computing certification for 2017 by Cloud Computing Intelligence.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

ISC2

IAM: Your Tool to Defeating Data Breaches
sponsored by SailPoint Technologies
WHITE PAPER: A disturbingly common thread with data breaches is that someone inside the organization did something they weren't supposed to. Discover why insider threats are so universal, why they may not be as malicious as you think, how technological vulnerabilities are now less of a security concern than human weaknesses, and more.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

SailPoint Technologies

SAS Solution for Personal Data ProtectionEnabling compliance with new regulation
sponsored by SAS
WHITE PAPER: Failing to comply with the GDPR can result in a fine of 20 million EUR or 4% of your organization's annual global turnover: it's simply a risk you can't ignore. Discover: 10 compliance challenges, 3 de-identification techniques that create problems, and 5 areas for improvement to help meet evolving demands.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

SAS

Log Management and Analytics: Your Guide
sponsored by Logentries
WEBCAST: Discover a demonstration on exactly how to successfully manage logs, server data, and analytics.
Posted: 19 Apr 2017 | Premiered: Apr 13, 2017

Logentries

Cloud Security Report: How is IT Responding to Today's Threats
sponsored by Cloudvisory
WHITE PAPER: Access this 2017 cloud security spotlight report to learn how organizations are responding to the security threats in the cloud, and what tools and best practices IT security leaders are considering in their move to the cloud, and more.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Cloudvisory

Information Insight for GDPR Compliance
sponsored by Hewlett-Packard Enterprise
WEBCAST: Learn about the General Data Protection Regulation and its impact on compliance in the enterprise. Learn the objectives of GDPR for citizens and enterprises, the business opportunity of GDPR, and more.
Posted: 06 Apr 2017 | Premiered: Feb 5, 2017

Hewlett-Packard Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement