IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Log Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Log Monitoring Reports
 
Proactive Responses to Today's Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores and endpoint management solution that can mitigate your risk of an attack and limit the damage when one happens.
Posted: 05 Nov 2014 | Published: 15 Oct 2014

IBM

The Problem with Your Threat Intelligence
sponsored by Risk IO
WHITE PAPER: This exclusive white paper explores some common security intelligence mistakes you might be making.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Risk IO

5 ½ Traits that make a Firewall “Next Gen”
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive white paper offers up five and half features that make a firewall next-generation.
Posted: 29 Jan 2015 | Published: 15 Dec 2014

Fortinet, Inc.

4 Security Must-Haves For DDoS Protection
sponsored by Neustar®
WHITE PAPER: This white paper acts as a DDoS platform buyer's guide and presents the 4 key components to have to ensure protection. View now and examine why each of the 4 pieces is imperative to have in your next DDoS security solution.
Posted: 20 May 2015 | Published: 29 Apr 2015

Neustar®

Advanced Attacks Require an Advanced Solution
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper outlines a simple three phase framework for detecting and blocking concealed threats and protecting data on your network and beyond.
Posted: 12 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Case Study: Open Source DNS vs. Bots
sponsored by Nominum, Inc.
CASE STUDY: This case study examines the challenges and consequences that occur when bots lurk in your network.  View now to learn how to remove current bots and block future attacks.
Posted: 12 May 2015 | Published: 25 Mar 2015

Nominum, Inc.

Gartner - Top Security Trends Takeaways for 2013-14 Webinar Slides
sponsored by Dropbox for Business
WHITE PAPER: These slides outline the state of information security and what you need to know to stay protected.  Read on to uncover insider tips for mitigating risks in the several computing environments.
Posted: 30 Mar 2015 | Published: 29 Aug 2013

Dropbox for Business

Survey Results: How Are IT Teams Using Security Analytics?
sponsored by Hewlett-Packard Company
WHITE PAPER: Read this report to learn how IT security teams use security analytics and intelligence to stop attacks.
Posted: 12 Nov 2014 | Published: 15 Oct 2014

Hewlett-Packard Company

Penn State saves up to USD 300,000 per year by using IBM Endpoint Manager
sponsored by IBM
VIDEO: This exclusive video case study reveals the endpoint management solution Penn State University turned to in order to manage their heterogeneous distributed environments and reduce costs.
Posted: 30 Jan 2015 | Premiered: 30 Jan 2015

IBM

Fighting Today's Advanced Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper demystifies APTs and reveals a three phase strategy to defending your network against determined cybercriminals.
Posted: 13 May 2015 | Published: 22 Apr 2015

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement