IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Log Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Log Monitoring Reports
 
Out of Order! The Risks of Being Out of Compliance
sponsored by Globalscape
WHITE PAPER: Discover common regulations and how compliance risks evolved across the enterprise, the top 6 consequences of failing to comply with industry or government regulations, and the role of data management in helping facilitate or maintain compliance.
Posted: 22 May 2017 | Published: 22 May 2017

Globalscape

Stop Attacks in Real-Time with Threat Intelligence
sponsored by Cisco Umbrella
VIDEO: Take a closer look into how threat intelligence can take massive amounts of information and make sense of it all. See how you can use this strategy to respond to threats in real-time before they become attacks.
Posted: 14 Aug 2017 | Premiered: 07 Mar 2017

Cisco Umbrella

Why You Need an Automated Approach to Cloud Security and Compliance
sponsored by evident.io
WHITE PAPER: Learn how to embrace a continuous security model, making your organization able to automate many processes that would normally overwhelm your teams and systems if they had to be done manually.
Posted: 22 May 2017 | Published: 22 May 2017

evident.io

SecOps Webinar: Seven Essentials for Effective Vulnerability Response
sponsored by ServiceNow
WEBCAST: The 2016 Verizon Data Breach Investigation Report reveals that the top 10 vulnerabilities accounted for 85% of successful exploit traffic. This webinar reveals 7 essentials for effective vulnerability response.
Posted: 31 Aug 2017 | Premiered: Aug 31, 2017

ServiceNow

The Five Essential Capabilities of an Analytics-Driven SOC
sponsored by Splunk
WHITE PAPER: Organizations are now looking to analytics-driven security operations centers (SOCs) to close the gaps in their network defenses. In this white paper, uncover how a successful SOC should have 5 key attributes.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Splunk

Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE: In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017

Bayshore Networks

Key Considerations for Securing Privilege on the Endpoint
sponsored by CyberArk Software, Inc
WHITE PAPER: Learn 4 key considerations for securing privilege on the endpoint, how privilege is abused by malicious actors to cause breaches, and more.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

CyberArk Software, Inc

Use Case: Securing Data Centers
sponsored by Bayshore Networks
WHITE PAPER: In this use case, learn how to secure your vulnerable data centers. Also learn about proactive prediction of Industrial Controls failures, ROI associated with capital and maintenance costs, and more.
Posted: 26 May 2017 | Published: 26 May 2017

Bayshore Networks

Evaluating Privileged Account Security: 7 Considerations
sponsored by CyberArk Software, Inc
WHITE PAPER: Learn how to avoid giving malicious actors the "all-access pass" they want when trying to crack a privileged user account through 7 questions to ask your privileged account security provider.
Posted: 30 May 2017 | Published: 30 May 2017

CyberArk Software, Inc

Resolve Web Security Issues with Industry Experts' Advice
sponsored by Veracode, Inc.
EGUIDE: Learn how to bridge the communication divide between app developers and security pros, as well as foster secure coding practices in your enterprise to mitigate the vulnerabilities in your web applications.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement