IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Log Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Log Monitoring Reports
 
Cisco Advanced Malware Protection for Networks
sponsored by Cisco
WHITE PAPER: This white paper shows you an advanced malware protection solution that detects, blocks, tracks and contains malware threats across multiple threat vectors.
Posted: 05 Feb 2016 | Published: 31 Dec 2015

Cisco

The Expectation of SSL Everywhere
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will learn about the importance of SSL in securing personal data as it's grown since the Internet's inception and how it's brought cryptography to the common man.
Posted: 27 Jan 2016 | Published: 02 Dec 2015

F5 Networks

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This white paper infographic will show you specific instances of cybercrime around the world and against what applications were vulnerable.
Posted: 28 Jan 2016 | Published: 15 Dec 2015

Dimension Data

Protect Against Evolving DDoS Threats: The Case for Hybrid
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will discover how you can achieve assurance and protect your organization now and into the future. Learn how to choose a solution that will help you defend and block attacks as well as be fully embraced by your operations team.
Posted: 22 Jan 2016 | Published: 09 Dec 2015

F5 Networks

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION
sponsored by Blue Coat Systems
WHITE PAPER: This white paper shows you how you can add real-time threat detection and protection to your secure network.
Posted: 04 Feb 2016 | Published: 31 Dec 2014

Blue Coat Systems

Evaluating Cloud Security Solution for Office 365
sponsored by Palerra Inc.
WHITE PAPER: Choosing the right Office 365 cloud security approach to defend your data is no simple task. This buyers guide gives you all of the key criteria and must-have features to look for when choosing a strategy.
Posted: 20 Jan 2016 | Published: 30 Dec 2015

Palerra Inc.

Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This white paper defines Big Data Security and its underlining security analytics and malware analysis technology.
Posted: 04 Feb 2016 | Published: 31 Dec 2015

Blue Coat Systems

The Realities of FedRAMP Continuous Monitoring and Penetration Testing Requirements
sponsored by Coalfire
WEBCAST: This webcast explores the requirements that CSPs must meet on monthly, quarterly and an annual basis. Find answers to common FedRAMP questions, solutions for complexities that continuous monitoring can present and lessons learned from the continuous monitoring portion of FedRAMP.
Posted: 26 Jan 2016 | Premiered: Sep 16, 2015

Coalfire

Powerful Data Protection, Anywhere
sponsored by Vera
WHITE PAPER: In this white paper, discover how you can secure all of your devices and applications. Find out how you can effortlessly collaborate with anyone from anywhere.
Posted: 27 Jan 2016 | Published: 02 Dec 2015

Vera

State-sponsored Hacking troubles US Government
sponsored by LogicNow
EGUIDE: This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
Posted: 01 Feb 2016 | Published: 25 Jan 2016

LogicNow
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement