IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Log Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Log Monitoring Reports
 
Beginner's Guide to Open Source Intrusion Detection Tools
sponsored by AlienVault
WHITE PAPER: This guide provides an overview of some of the most popular Open Source IDS tools, along with pros/cons of each.
Posted: 19 Jan 2016 | Published: 06 Jan 2016

AlienVault

Addressing the Full Attack Continuum Before, During, and After an Attack
sponsored by Cisco
WHITE PAPER: In this white paper, you will discover a new threat-centric security model that delivers visibility and control your business needs across its extended network.
Posted: 04 Feb 2016 | Published: 31 Dec 2014

Cisco

Cyber Situational Awareness
sponsored by Digital Shadows
WHITE PAPER: This white paper explores cyber situational awareness and presents a three-staged approach to incorporate cyber situational awareness into your defenses.
Posted: 05 Feb 2016 | Published: 31 Jan 2016

Digital Shadows

Partitioning vs. "Split By" Clause in Anomaly Detection
sponsored by Prelert
WHITE PAPER: This white paper points out the finer differences between anomaly detection approaches and how each affects your anomaly score. Read on to learn which strategy will enhance your network security.
Posted: 02 Feb 2016 | Published: 20 Jul 2015

Prelert

Major Government Defense Contractor Speeds Incident Response
sponsored by Blue Coat Systems
CASE STUDY: This case study details how one major government defense contractor lacked network visibility and continuously suffered from security incidents and closed their gaps by implementing analytics. Are analytics necessary for your organization? Read on to find out.
Posted: 02 Feb 2016 | Published: 20 Aug 2015

Blue Coat Systems

The State of Mobile Application Security (4th Edition)
sponsored by IBM
WHITE PAPER: This white paper will give you the latest statistics of online piracy and show you what you can do to protect your IP.
Posted: 29 Jan 2016 | Published: 10 Dec 2015

IBM

40 Question You Should Have in Your Vendor Security Assessment
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn how to get started with your VRM security program and by accessing the most important questions to ask third-party businesses.
Posted: 02 Feb 2016 | Published: 30 Apr 2014

BitSight

Complexity and Data Growth Driving Small and Medium-Sized Environments Toward a New Generation of Data Protection
sponsored by Acronis
WHITE PAPER: Continue reading this white paper to learn how different businesses are utilizing a variety of strategies to manage their cloud, virtual and physical servers. Discover how to manage your hybrid IT environment efficiently.
Posted: 25 Jan 2016 | Published: 18 Jun 2014

Acronis

Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This white paper defines Big Data Security and its underlining security analytics and malware analysis technology.
Posted: 04 Feb 2016 | Published: 31 Dec 2015

Blue Coat Systems

Intro to Faster Threat Intelligence
sponsored by OpenDNS
WEBCAST: In this webcast, learn how to dust for clues hackers leave behind in your network to remedy security threats before they escalate to issues.
Posted: 04 Feb 2016 | Premiered: Sep 22, 2015

OpenDNS
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement