IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
1 - 25 of 313 Matches Previous Page  |  Next Page
Active Visibility for Multi-Tiered Security
sponsored by Gigamon
WHITE PAPER: Access this white paper to learn how a multi-tiered security strategy can help you effectively deploy the security tools at your disposal.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Gigamon

Rules Of Engagement: A Call To Action To Automate Breach Response
sponsored by Digital Guardian
WHITE PAPER: This white paper delves into why security teams need to automate incident response (IR) plans to defend against dynamic cybercriminal attacks. View now to learn the four steps to developing an automated rules of engagement workflow to combat hackers.
Posted: 14 Apr 2015 | Published: 02 Dec 2014

Digital Guardian

Comprehensive Data Protection Against Insider & Outsider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explores an endpoint focused security strategy to allow protection to travel with the data regardless of location or device.
Posted: 14 Apr 2015 | Published: 25 Mar 2015

Digital Guardian

The pros and cons of SSL decryption for enterprise network monitoring
sponsored by GeoTrust, Inc.
EGUIDE: Access this eGuide to hear from network security guru Brad Casey about the pros and cons of using SSL decryption for enterprise network monitoring. Read on to learn how this technique can bolster your network security, and answer your questions about SSL decryption.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

GeoTrust, Inc.

A Much Needed Cybersecurity Paradigm Shift
sponsored by UnitedLex
WHITE PAPER: This white paper explores why hackers have the upper hand in the battle for data and why organizations need to ramp up security measures, regardless of their current status. View now to gain insight into today's threat landscape.
Posted: 13 Apr 2015 | Published: 08 Oct 2014

UnitedLex

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper to learn about another perspective in POS system security. Read on for an overview of payment card systems and attack methods, as well as how to leverage the Council on CyberSecurity's 20 critical controls to your system's advantage.
Posted: 13 Apr 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

Point-of-Sale Security for Dummies
sponsored by Bit9 + Carbon Black
RESOURCE: Access this popular resource to find out how you can protect transactions at the point of sale.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

Bit9 + Carbon Black

5 Myths Holding Your Security Program Back
sponsored by Digital Guardian
WHITE PAPER: This white paper explores the five common security myths that actually hinder data protection efforts.  View now to learn more.
Posted: 10 Apr 2015 | Published: 25 Feb 2015

Digital Guardian

Best Practices for Intelligent Security and File-Sharing
sponsored by Ipswitch File Transfer
EGUIDE: Take a look at this expert guide to discover how to enhance your data protection with stronger threat intelligence and more secure file sharing.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Ipswitch File Transfer

Using Threat Intelligence to Manage Risk
sponsored by Threatstream
EGUIDE: In this expert guide, security experts discuss the benefits of threat intelligence and how you can decide if your enterprise needs it.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

Threatstream

Free Download: Real-Time, Comprehensive Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: Thankfully, this free trial gives you the opportunity to experiment with a comprehensive unified security management product.
Posted: 08 Apr 2015 | Premiered: 08 Apr 2015

AlienVault

The State of Threat Intelligence in 2015
sponsored by AlienVault
WHITE PAPER: In this research report, discover how many organizations have successfully implemented threat intelligence and what benefits they're experiencing.
Posted: 08 Apr 2015 | Published: 28 Feb 2015

AlienVault

Under Threat or Compromise Every Detail Counts
sponsored by Blue Coat Systems
WHITE PAPER: This white paper breaks down the five essential steps of security management to help you create a more comprehensive defense suited for today's threat landscape.
Posted: 08 Apr 2015 | Published: 31 Aug 2014

Blue Coat Systems

Keep Your Network Secure with Threat Intelligence and SIEM
sponsored by Threatstream
EGUIDE: In this expert e-guide, discover how to integrate threat intelligence with SIEM for optimal network security.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Threatstream

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: This white paper walks you through security policies to ensure that data doesn't leak out through encrypted tunnels. Read on now to learn how to improve your security strategy.
Posted: 07 Apr 2015 | Published: 20 Jan 2015

Blue Coat Systems

Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webcast, discover the six key steps you need to take to optimize your SIEM use.
Posted: 07 Apr 2015 | Premiered: Apr 7, 2015

AlienVault

The Business Value of a Comprehensive All-in-OneData Protection Solution for Your Organization
sponsored by Asigra
WHITE PAPER: Access this white paper to learn how to develop a comprehensive data protection strategy to have transparent visibility and complete control. View now to explore the five common failures of data protection and how to overcome each.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Asigra

Revolutionizing Advanced Threat Protection
sponsored by Blue Coat Systems
WHITE PAPER: This white paper suggests ways for you to create a comprehensive security system that works against today's complex threat landscape.
Posted: 06 Apr 2015 | Published: 31 Jul 2014

Blue Coat Systems

Three-Pronged Approach to Improving Physical Security
sponsored by Modulo
WHITE PAPER: View this white paper to discover how to improve the physical protection of data through a three-pronged approach and how people, processes, and technologies can be used to minimize the disruption of information losses. Access now to learn more.
Posted: 02 Apr 2015 | Published: 04 Feb 2015

Modulo

Prepare Yourself for the Cybercrime of 2015
sponsored by FireEye
WHITE PAPER: This 2015 cybercrime report analyzes the threats of 2014 and makes predictions for what you need to be prepared for in the upcoming year.
Posted: 02 Apr 2015 | Published: 31 Dec 2014

FireEye

Gartner - Top Security Trends Takeaways for 2013-14 Webinar Slides
sponsored by Dropbox for Business
WHITE PAPER: These slides outline the state of information security and what you need to know to stay protected.  Read on to uncover insider tips for mitigating risks in the several computing environments.
Posted: 30 Mar 2015 | Published: 29 Aug 2013

Dropbox for Business

Best Practices for Incident Detection and Response
sponsored by SurfWatch Labs
WEBCAST: This webcast teaches you how to get the most from your threat intelligence by presenting the best practices for incident detection and response.
Posted: 30 Mar 2015 | Premiered: Feb 20, 2015

SurfWatch Labs

Markets and Bounties for Cybercrime Tools and Stolen Data
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper examines the fundamental characteristics of black and grey markets to offer understanding of the current and predicted security threat landscape.
Posted: 27 Mar 2015 | Published: 04 Dec 2014

Juniper Networks, Inc.

3 Ways Anomaly Detection Improves IT Operations
sponsored by Prelert
WHITE PAPER: Read this white paper to discover the three ways anomaly detection can streamline and enhance your risk management strategy.
Posted: 26 Mar 2015 | Published: 31 Dec 2014

Prelert

Alternative Strategies to Mobile Device Security
sponsored by Maas360 by IBM
WEBCAST: This webcast offers an alternative to managing an entire mobile device and keeps enterprise data inside an encrypted container.
Posted: 24 Mar 2015 | Premiered: Jan 21, 2015

Maas360 by IBM
1 - 25 of 313 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement