IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Log Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Log MonitoringReports
 
Building momentum: Symantec's new approach to security
sponsored by TechTarget
RESOURCE: Despite its undisputed dominance of the security market, Symantec's revenues have remained static in recent years. Arif Mohamed reports in this eGuide, whether the expansion of its enterprise data security, cloud and mobile portfolio will return it to growth.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Security Management 2.5: Replacing Your SIEM Yet?
sponsored by IBM
WHITE PAPER: This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment.
Posted: 20 Mar 2014 | Published: 01 Feb 2014

IBM

The Big Data Security Analytics Era is Here
sponsored by EMC Corporation
WHITE PAPER: Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
Posted: 11 Apr 2014 | Published: 31 Jan 2014

EMC Corporation

Top 5 Truths About Big Data Hype and Security Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource outlines the top five truths behind the Big Data hype and explains why Big Data Security Analytics (BDSA) is the future of security intelligence. Read on to learn how it offers the insight you need to perform real-time threat detection and defense.
Posted: 05 Sep 2013 | Published: 05 Sep 2013

Hewlett-Packard Company

Integrated IT Security for Midsize Businesses
sponsored by IBM
WHITE PAPER: This guide explores security management strategies and how to combat the growth of sophisticated threats.
Posted: 26 Feb 2014 | Published: 31 Oct 2013

IBM

Information Security Magazine
sponsored by SearchSecurity.com
EGUIDE: In our inaugural issue of 2014, we look at the top cyberthreats and attack techniques that security professionals are likely to face this year.
Posted: 03 Feb 2014 | Published: 03 Feb 2014

SearchSecurity.com

6 Point Solution Evaluation Checklist
sponsored by Hewlett-Packard Company
EGUIDE: With such a wide range of SIEM solutions, it is important to understand the challenges in its implementation. This expert e-guide explores Satish Jagu's 6 point SIEM solution evaluation checklist.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

Hewlett-Packard Company

Security University: Security Analytics
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to develop a customized program that delivers insightful, actionable security analytics. Key points of emphasis include defining success, identifying needs, developing and integrating data sources, and ultimately analyzing information and using it to make smarter security decisions.
Posted: 07 Feb 2014 | Premiered: 14 Feb 2014

SearchSecurity.com

State of Security Operations
sponsored by Hewlett-Packard Company
WHITE PAPER: With businesses recognizing the need for further investment in cyber-defense, it is essential to figure out which tools and strategies are best for your organization. Read now and find out more about the current state of security operations in 2014.
Posted: 14 Mar 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

SIEM Best Practices For Advanced Attack Detection
sponsored by Hewlett-Packard Company
EGUIDE: SIEM struggles are common, but SIEM products are critical for advanced attack detection. This expert e-guide offers best practices when implementing SIEM products and how to overcome implementation issues.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement