IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Log Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Log Monitoring Reports
 
The SIEM Essentials to Creating Your Own Security Posture
sponsored by Splunk
WEBCAST: Watch this webcast to learn how one of the United States' biggest nuclear research firms puts this SIEM software to work as part of their security posture. Go inside to learn how, by implementing this program, you too can get customizable incident reporting, real time account activity dashboards, and more.
Posted: 16 Oct 2017 | Premiered: Sep 28, 2017

Splunk

Why Conventional MSSPs are No Longer Sufficient
sponsored by InteliSecure
EGUIDE: Learn how traditional, legacy managed security services are no longer holding up in this new era of next gen MSSPs.
Posted: 23 May 2017 | Published: 23 May 2017

InteliSecure

European Businesses: You have a BYOD programme whether you like it or not
sponsored by Lookout
WHITE PAPER: 40% of employees at agencies with rules prohibiting personal smartphone use at work say the rules have little to no impact on their behavior. This white paper reveals what your business doesn't know about employee mobile device habits in the workplace.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Lookout

Mobile and Cloud Security : VMware AirWatch vs. MobileIron
sponsored by MobileIron
RESOURCE: Discover a comparison between VMware AirWatch and MobileIron to see which one can provide a better MDM solution for your organization.
Posted: 25 May 2017 | Published: 25 May 2017

MobileIron

How to Resolve a Web Application Security Vulnerability
sponsored by Veracode, Inc.
EGUIDE: Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

Not All Machine Learning Is Created Equal
sponsored by Cylance
WHITE PAPER: Discover how to apply machine learning to your organization's endpoint security and achieve unprecedented efficacy rates, minimal consumption of system resources, exceptional attack prevention speed, and more.
Posted: 08 May 2017 | Published: 08 May 2017

Cylance

Unmasking Subdomain Abuse: How to Protect Against These Stealth Attacks
sponsored by Farsight Security
TRANSCRIPT: Discover how cyber-criminals are increasingly using both legitimate as well as malicious subdomains to gain entry into networks and commit other cyber-crime.
Posted: 08 May 2017 | Published: 03 Feb 2017

Farsight Security

Don't Settle for Good Enough Mobile Security: Transform Business Processes
sponsored by MobileIron
WHITE PAPER: Discover what security features your enterprise needs to consider in an EMM solution, and how to deploy one that will provide fully integrated mobile, cloud, and desktop management, protect your email on smartphones, and more.
Posted: 25 May 2017 | Published: 25 May 2017

MobileIron

How to Effectively Manage the Cloud Logs of Security Events
sponsored by Splunk
EGUIDE: Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.
Posted: 16 May 2017 | Published: 11 May 2017

Splunk

The State of Endpoint Security: Approaches, Opportunities and Conclusions
sponsored by TrendMicro
WHITE PAPER: Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

TrendMicro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement