IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Log Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Log Monitoring Reports
Critical Capabilities for Security Information and Event Management (SIEM)
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this report for insight on aligning IT's needs with three key use cases to choose the best SIEM solution for the organization.
Posted: 12 Nov 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

Future Security Fortification - The Road Ahead
sponsored by IBM
WHITE PAPER: In this white paper, learn the expected security challenges your company may face in the next 5 years. Read on to uncover tips and best practices for securing your organization against these threats.
Posted: 23 Mar 2015 | Published: 04 Dec 2014


Practical Threat Management for Educational Institutions
sponsored by AlienVault
WHITE PAPER: This white paper provides security tips and suggestions designed to work with the needs – and the budget – of an educational institution.
Posted: 09 Jun 2015 | Published: 31 May 2015


How Partitioning Technology Delivers Consolidation Without Compromising Performance, Security, or Isolation
sponsored by Unisys
WHITE PAPER: In this white paper learn about a new partitioning technology that is architected, designed, and developed to deliver a predictable, secure, scalable, distributed environment. Read on to see a comparison of modern partitioning vs. virtualization options.
Posted: 04 Nov 2015 | Published: 31 Dec 2014


Unified Security Management vs. SIEM: A Technical Comparison
sponsored by AlienVault
WHITE PAPER: This white paper explores why SIEM solutions have been proven to be less effective than their vendors claim.
Posted: 10 Jul 2015 | Published: 10 Jul 2015


Expose Attacks on Microsoft Office and Evaluate Your Network Security Architecture
sponsored by Fortinet, Inc.
WHITE PAPER: Access this solution brief now to learn more about the most popular MS Office threats and how sandboxing can be a key part of your security strategy to protect against these advanced network attacks.
Posted: 15 Jun 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Make Your SIEM the Best It Can be
sponsored by
EBOOK: This resource will help you use your SIEM system to your utmost advantage.
Posted: 09 Nov 2015 | Published: 09 Nov 2015

Special Report: Which SIEM Platform is Best for You?
sponsored by IBM
WHITE PAPER: This Gartner report examines thirteen of the leading SIEM vendors, giving a detailed analysis of each one's strengths and weaknesses.
Posted: 31 Aug 2015 | Published: 20 Jul 2015


6 Ways Hackers Try to Break Secure Sockets Layer-Encrypted Data
sponsored by Blue Coat Systems
EGUIDE: How do hackers break through secure sockets layer-encrypted data exactly? This expert e-guide has the answer, exploring six common methods these cyber-criminals use.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Blue Coat Systems

Secure VDI Desktops the Same Way you Would Physical Ones
sponsored by Dell
EGUIDE: Download this expert resource now to learn about protecting your virtual desktops and much more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement