IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Log Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Log Monitoring Reports
Healthcare Security: The Simplest Way to Stay Ahead of Attacks
sponsored by OpenDNS
RESOURCE: In healthcare, a ransomware outbreak can lead to a true life or death situation – and cybercriminals know that you'll pay up to decrypt patient data. Access this brief to find out how you can simplify PHI protection and close security gaps to significantly reduce malware from getting in and data from being exfiltrated.
Posted: 03 Oct 2016 | Published: 30 Sep 2016


Mobile Data Report 2016
sponsored by Wandera
ANALYST REPORT: Find an analysis of mobile data security and usage trends along with traffic patterns across a global network of enterprise mobile devices. Find significant new mobile threats and compare security and data usage between Samsung Galaxy and Apple devices, as well as between roaming and domestic data usage.
Posted: 20 Oct 2016 | Published: 30 Apr 2016


It’s Not You, It’s Me: Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: Discover what specific security responsibilities belong to you and your provider, the latest cloud security threats, and 7 cloud security best practices.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Alert Logic

Top 5 Pitfalls to Avoid in Your Data Protection Strategy
sponsored by HDS and Veritas
WHITE PAPER: Discover five critical pitfalls to avoid when building a successful data protection strategy for your organization. Learn how to best navigate the various data protection solutions from digital to physical and private to public clouds while ensuring enterprise scalability.
Posted: 14 Oct 2016 | Published: 30 Sep 2016

HDS and Veritas

Cloud App and Service Adoption: 11 Key Steps IT Should Take
sponsored by Symantec + Blue Coat
WHITE PAPER: You need to know which cloud service providers will break your fall in the event of unauthorized access to critical data. Uncover 11 steps to secure adoption for cloud apps and services.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

Symantec + Blue Coat

How to Protect Data from Ransomware
sponsored by Dell Software
WHITE PAPER: It can be difficult to recover data that is encrypted by ransomware malware. In this expert guide, discover how to stop ransomware from breaching your network in the first place and backup all of your data.
Posted: 27 Sep 2016 | Published: 22 Sep 2016

Dell Software

Why NGFWs Are Becoming the New Standard in Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: The next-generation firewall (NGFW) is quickly becoming the new standard approach for enterprise security. Discover how your organization can add a high performance, highly effective NGFW without slowing down daily business operations. Learn how you can achieve unparalleled protection, ease of use and ultrafast performance with your NGFW.
Posted: 12 Oct 2016 | Published: 30 Sep 2016

Fortinet, Inc.

DDoS Response Playbook
sponsored by Imperva
WHITE PAPER: Discover how to plan for and execute a DDoS response plan. Learn pragmatic steps and best practices for choosing and setting up the right mitigation solution for your organization, how to authoritatively respond to an attack, and conduct a thorough post-attack analysis for developing follow-up defense strategies.
Posted: 14 Oct 2016 | Published: 30 Sep 2016


How to Use an Incident Response Policy to Better Collaborate
sponsored by Delta Risk
EGUIDE: In this e-guide learn how to not only prepare your organization's response to a security incident, but also how to work with outside forces more effectively to detect, analyze, contain, and eradicate – as well as, recover essential data.
Posted: 07 Oct 2016 | Published: 06 Oct 2016

Delta Risk

Deciphering the Tactics of the Enemy: APT-Style Attacks
sponsored by Dimension Data
EGUIDE: In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement