IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Log Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Log Monitoring Reports
 
Conquer Threats with Collaborative, Scalable Security Intelligence
sponsored by IBM
WHITE PAPER: Meet new and sophisticated security threats head-on with adaptable SIEM tools that can scale as your organization does. Discover the power to act at scale with a fast and easy, cost-effective method to meet changing security needs.
Posted: 17 Nov 2016 | Published: 31 Oct 2016

IBM

Managed Detection and Response
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Remove the burden or choosing the right security tools. Discover how to achieve best-in-class Managed Detection and Response with your limited budget.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Dangerous Threats Require Backup for Data Protection and Recovery
sponsored by Code42
WHITE PAPER: Discover the intricacies of data leakage and theft, the motivations and tactics of a wide range of attackers, and guidance for effective action against their machinations.
Posted: 17 Nov 2016 | Published: 30 Nov 2015

Code42

Mitigating The Impact of Critical IT Events
sponsored by Splunk
RESOURCE: In this infographic, learn more about the damage caused by CIEs and how you can mitigate the costs associated with downtime, boost productivity, and improve visibility into operations.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Splunk

Go Beyond Just Securing Your Cloud, Make it Better
sponsored by Intel Security
RESOURCE CENTER: Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

Intel Security

6 Ways to Put 'Secure" Back in Secure Web Gateways
sponsored by Trustwave
WEBCAST: Recent research shows 33% of malware used encryption, underscoring the importance of having an advanced secure web gateway with the capability to inspect encrypted content. Discover practical steps your organization can take to optimize protection and policy control for your web users.
Posted: 09 Nov 2016 | Premiered: Oct 31, 2016

Trustwave

The Future Of Data Security And Privacy: Growth And Competitive Differentiation
sponsored by Absolute
ANALYST REPORT: Data security and privacy is a competitive differentiator in today's data-centric business environments. In this Forrester report, learn how to put security closer to your data and gain that competitive advantage over your peers. Get greater visibility to control access to resources and watch user behavior diligently.
Posted: 22 Nov 2016 | Published: 07 Jul 2016

Absolute

Outthinking Cybercrime: Prepare for the Human Factor
sponsored by Trustwave
WEBCAST: Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.
Posted: 08 Nov 2016 | Premiered: Oct 6, 2016

Trustwave

Resource Center: How to Safeguard Data
sponsored by Intel Security
RESOURCE: This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Intel Security

How SAIC Empowers Its Security Operations Center with Splunk
sponsored by Splunk
WEBCAST: In this webinar hear from Jonathan Jowers, SAIC chief security information officer as he discusses how SAIC powers its SOC and has improved its threat detection and investigations, while reducing costs and complexity. This webinar will also cover the best practices around IT security strategy, incident response, insourcing a SIEM, and more.
Posted: 09 Nov 2016 | Premiered: Nov 9, 2016

Splunk
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement