IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
1 - 25 of 660 Matches Previous Page  |  Next Page
The SIEM Essentials to Creating Your Own Security Posture
sponsored by Splunk
WEBCAST: Watch this webcast to learn how one of the United States' biggest nuclear research firms puts this SIEM software to work as part of their security posture. Go inside to learn how, by implementing this program, you too can get customizable incident reporting, real time account activity dashboards, and more.
Posted: 16 Oct 2017 | Premiered: Sep 28, 2017

Splunk

European Businesses: You have a BYOD programme whether you like it or not
sponsored by Lookout
WHITE PAPER: 40% of employees at agencies with rules prohibiting personal smartphone use at work say the rules have little to no impact on their behavior. This white paper reveals what your business doesn't know about employee mobile device habits in the workplace.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Lookout

A Day in the Life of a GDPR Breach
sponsored by Splunk
WEBCAST: This webcast outlines what the GDPR entails, as well as outlines a basic guide for what will happen, and what you should do to mitigate the damage done by a GDPR breach.
Posted: 12 Oct 2017 | Premiered: Sep 26, 2017

Splunk

2017 Cyberattack Trends
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This report outlines how the threat landscape has changed in 2017 when it comes to ransomware, banking and mobile threats. Read on to learn from the past, so you might better secure the future.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Check Point Software Technologies Ltd.

Agile Development to Transform Your Application Testing Program
sponsored by IBM
WEBCAST: Watch this webinar to reveal how Cisco has transformed their application testing program to improve their application security.
Posted: 21 Sep 2017 | Premiered: May 18, 2017

IBM

Mid-Year Cybersecurity Report 2017
sponsored by Cisco Systems, Inc.
RESEARCH CONTENT: Security teams are faced with protecting their companies' key assets from a constantly evolving threat landscape – making it imperative to stay on the pulse of cybersecurity. Explore this report to learn about current attacker behaviors, trends in vulnerability management, evolutions in malware, and beyond.
Posted: 20 Sep 2017 | Published: 31 Jul 2017

Cisco Systems, Inc.

Market Trends: Automation and Integration Critical to Application Security Tool Adoption
sponsored by IBM
WHITE PAPER: Take a closer look at this market trend report to reveal findings from Gartner research surveys regarding organizations' use of DevOps and security.
Posted: 20 Sep 2017 | Published: 17 Jan 2017

IBM

5 Reasons to Choose Dell EMC for Data Protection
sponsored by Dell EMC and Intel®
RESOURCE: Download this resource to get an overview of Dell EMC's data protection portfolio, including five foundational features that ensure you'll meet all of your data protection requirements.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Dell EMC and Intel®

Hybrid AI Takes on Cybersecurity
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Will hybrid AI disrupt your information security team? Experts agree that AI is the next step in identifying threats, but are we facing Westworld or just an evolutionary advancement? 7 security experts weigh in, inside this special report.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Arctic Wolf Networks, Inc.

Network Visibility for Dummies
sponsored by Ixia
EBOOK: You can't monitor what you can't see. When it comes to establishing strong security, visibility across all your network traffic is essential. This 77-page e-book, Network Visibility for Dummies, describes how you can achieve truly resilient and effective network security.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Ixia

Code Red: You've Been Infected
sponsored by Codero
EBOOK: WannaCry ransomware targets Microsoft Windows operating systems. Check out this e-book to uncover steps you can take to mitigate WannaCry damage.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Codero

Stop Attacks in Real-Time with Threat Intelligence
sponsored by Cisco Umbrella
VIDEO: Take a closer look into how threat intelligence can take massive amounts of information and make sense of it all. See how you can use this strategy to respond to threats in real-time before they become attacks.
Posted: 14 Aug 2017 | Premiered: 07 Mar 2017

Cisco Umbrella

Yelp Customer Story: Secure Content with Threat Intelligence and Automated Protection
sponsored by Cisco Umbrella
CASE STUDY: Discover how Yelp fosters trust between their users and its online content by preempting potentially dangerous malware attacks and other threats with cloud-delivered automated protection and integrated threat intelligence.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Cisco Umbrella

Internet Security Threat Report
sponsored by Symantec
WHITE PAPER: In this comprehensive guide, review some of the major security attacks and vulnerabilities from 2016, and learn how it can inform your policy moving into the future.
Posted: 08 Aug 2017 | Published: 28 Apr 2017

Symantec

SME cyber security is increasingly a business imperative
sponsored by ComputerWeekly.com
EGUIDE: A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

ComputerWeekly.com

Securing Industrial IoT Technology: 4 Key Considerations
sponsored by Bayshore Networks
WHITE PAPER: Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Bayshore Networks

Cyber security in the Nordics
sponsored by ComputerWeekly.com
EGUIDE: With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.
Posted: 31 Jul 2017 | Published: 31 Jul 2017

ComputerWeekly.com

Your expert guide to the highlights of Infosecurity Europe 2017
sponsored by ComputerWeekly.com
EGUIDE: Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

ComputerWeekly.com

Malware Review Q1 2017
sponsored by PhishMe
WHITE PAPER: Learn what malware was up to in Q1 2017, what the numbers mean, and what can be learned to give your organization the ability to mitigate the next wave of malware.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

PhishMe

Your Guide to Combating Phishing in 2017
sponsored by PhishMe
WHITE PAPER: To better understand the benefits, costs, and risks associated with PhishMe, Forrester interviewed executives at five companies with experience using simulator, reporting, and triage tools. Uncover the results in this report today.
Posted: 13 Jun 2017 | Published: 12 Jun 2017

PhishMe

Six Criteria for Buying Data Loss Prevention Products
sponsored by InteliSecure
EGUIDE: Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

Cisco ASA 5500 Series Adaptive Security Appliances
sponsored by Cisco Systems, Inc.
DATA SHEET: Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.
Posted: 28 Aug 2017 | Published: 09 Jun 2009

Cisco Systems, Inc.

Navigating The Evolving Threat Landscape with Network Security
sponsored by TrendMicro
WHITE PAPER: Discover why targeted attacks are the weapon of choice: a far more lucrative tactic that uses malware purpose-built to bypass defenses and penetrate the network of a single organization. Learn how to combat these threats with network security tactics.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

TrendMicro

How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: Discover the dynamics of the hybrid cloud, and uncover the security challenges that organizations are facing as they adopt the latest technologies.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

TrendMicro

The State of Endpoint Security: Approaches, Opportunities and Conclusions
sponsored by TrendMicro
WHITE PAPER: Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

TrendMicro
1 - 25 of 660 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement