IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
1 - 25 of 799 Matches Previous Page  |  Next Page
Get the Most out of your SIEM System
sponsored by Trustwave
EGUIDE: SIEM platforms remove a huge burden from your security team and allow them to focus on other analysis-related tasks. However, SIEM systems are not infallible. Discover how to better employ your SIEM system to produce the most accurate event analysis you can hope for.
Posted: 27 Sep 2016 | Published: 23 Sep 2016

Trustwave

Akamai’s [state of the internet] Q2 2016 executive review
sponsored by Akamai
RESOURCE: This report shows you statistics based on cybersecurity information gathered from Q2 2016. It's meant to enable businesses and governments to make intelligent, strategic decisions about broadband connectivity and cloud security moving forward.
Posted: 27 Sep 2016 | Published: 31 Aug 2016

Akamai

Akamai’s [state of the internet] Q2 security 2016 Report
sponsored by Akamai
ANALYST REPORT: This report shows you the cybersecurity and attack trends to the end of Q2 2016, specifically in regards to DDoS and web application attacks. Access now to discover why we've experienced such a dramatic increase in DDoS and web application attacks.
Posted: 27 Sep 2016 | Published: 30 Apr 2016

Akamai

Risk Assessment Infographic
sponsored by STEALTHbits
RESOURCE: This short infographic gives you important facts and figures about the current state of risk assessment. Organizations are leaving themselves open to stolen files and other information risk. Don't be another statistic, assess how safe risk-prone your organization is ASAP.
Posted: 26 Sep 2016 | Published: 31 Aug 2016

STEALTHbits

Accelerating Digital Transformation with Data-Driven Security
sponsored by Akamai
ANALYST REPORT: This IDC report talks about digital transformation (DX) as a top driver for the IT industry and its security implications today. Discover how to keep sensitive files secure and your organization running smoothly even through the DX shift.
Posted: 26 Sep 2016 | Published: 31 May 2016

Akamai

Two factor authentication and digital identity management
sponsored by VASCO Data Security International
WHITE PAPER: Discover how to make the identification for healthcare organization users more simple and secure. By giving healthcare providers and staff members unique digital identities across an identity ecosystem, digital identity management will increase security while lowering the workflow burden of two-factor authentication.
Posted: 26 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Security Information and Event Management (SIEM) Orchestration
sponsored by Intel Security
WHITE PAPER: This document takes a deep look at one SIEM tool, and examines how it optimizes incident response processes. Explore ways to block threats more effectively, identify compromises, implement quick remediation, and more.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Intel Security

Kona Client Reputation
sponsored by Akamai
WHITE PAPER: Discover the business benefits and operational benefits you can achieve by adding a new, advance algorithm to your security infrastructure. Profile malicious users before they have a chance to infect your network.
Posted: 26 Sep 2016 | Published: 31 Dec 2015

Akamai

Incident Response Capabilities in 2016: The 2016 SANS Incident Response Survey
sponsored by Intel Security
RESEARCH CONTENT: A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as dwell time and automation. Explore the survey's results in this comprehensive report to uncover critical findings about the current IR landscape, breach environment, and areas that could see improvement in the near future.
Posted: 26 Sep 2016 | Published: 30 Jun 2016

Intel Security

Gigamon Helps Government Agency Meet Cybersecurity Requirements
sponsored by Gigamon
WHITE PAPER: This white paper describes how the HHS was able to meet their rigid security requirements and more. Discover how they were able to achieve pervasive visibility of all network traffic across geographically dispersed locations and keep their massive amount of private information safe.
Posted: 26 Sep 2016 | Published: 31 Dec 2015

Gigamon

Inside the 2016 Verizon Data Breach Investigations Report
sponsored by Intel Security
WEBCAST: Join Marc Spitler, Senior Manager at Verizon Security Research, and Raj Samani, CTO for EMEA, Intel Security, as they go over findings from this year's Data Breach Investigation Report.
Posted: 26 Sep 2016 | Premiered: Sep 26, 2016

Intel Security

Guidance on Healthcare Ransomware Attacks
sponsored by OpenDNS
EGUIDE: Learn from the U.S. Department of Health and Human Services on how to know if your healthcare organization is under attack from ransomware, how to recover, and how to know if HIPAA has been violated.
Posted: 23 Sep 2016 | Published: 16 Sep 2016

OpenDNS

Five Important Steps to Ransomware Remediation in Health IT
sponsored by OpenDNS
EGUIDE: Discover five key steps for responding to hospital ransomware attacks within this e-guide. Health IT expert Reda Chouffani will help you better understand the anatomy of ransomware and help you devise a recovery plan if ransomware should strike.
Posted: 23 Sep 2016 | Published: 16 Sep 2016

OpenDNS

Harnessing the Power of Metadata for Security
sponsored by Gigamon
WHITE PAPER: Discover how metadata, rich in context, can help analyze security metrics faster to enable rapid threat remediation. Learn how to enable more in-depth security analysis of traffic that is focused on the areas of concern, ultimately resulting in faster time to detection, response, and mitigation.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

Gigamon

GigaSECURE Security Delivery Platform
sponsored by Gigamon
VIDEO: Discover how to shift your security strategy from perimeter defenses towards a detect and protect frameworkm gaining greater visibility in the process. Learn how to extend the reach of your security applications everywhere on your network by giving them the right traffic at the right time.
Posted: 23 Sep 2016 | Premiered: 04 Aug 2015

Gigamon

Securing Data Access Within the Healthcare Industry
sponsored by VASCO Data Security International
WHITE PAPER: Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

TAG Cyber Report: 2017 Security Annual – Vol. 1
sponsored by Digital Guardian
WHITE PAPER: This report provides CISO team members with detailed technical and architectural guidance based on fifty specific controls that support the reduction of cyber risk. It's a practical handbook and reference guide for the cyber security professional.
Posted: 22 Sep 2016 | Published: 31 Aug 2016

Digital Guardian

New Tools Lead to Refined GRC Practices
sponsored by Proofpoint, Inc.
EGUIDE: See why most enterprises still struggle with governance, risk and compliance processes in the digital age. In this e-guide, learn the history of tried and failed document sorting methods and discover new tools, like text analytics and auto-classification that can help compliance practices in the future.
Posted: 22 Sep 2016 | Published: 20 Sep 2016

Proofpoint, Inc.

The Power of Precise Threat Intelligence: Which SecureWorks service is right for me?
sponsored by SecureWorks
WHITE PAPER: Creating meaningful threat intelligence requires specialized tools and expertise that go well beyond simple alerts and content searches. Discover hot to achieve this level of expertise within this short white paper. You'll gain a greater visibility into the deepest part of your network and better understand malware and the actors behind it.
Posted: 22 Sep 2016 | Published: 31 Aug 2016

SecureWorks

How to Secure Data Access Within the Healthcare Industry
sponsored by VASCO Data Security International
WHITE PAPER: Access this white paper to learn the changing role of technology within the health sector and why healthcare organizations continue to experience major data breaches. Discover best practices to help your organization integrate and adopt security without compromising the patient experience.
Posted: 22 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Deriving Value from the Technical Security Test
sponsored by SecureWorks
WHITE PAPER: Uncover a guide for your questions as you get into the process of choosing the right provider to meet your specific security testing needs. Learn key considerations that must be implemented in the selection process for technical testing providers.
Posted: 21 Sep 2016 | Published: 31 Aug 2016

SecureWorks

Ransomware Protection is Futile, but All Hope is Not Lost
sponsored by Dell Software
EGUIDE: Discover how you can avoid ransomware and save your critical files. Get advice from IT experts Trevor Pott, Michael Stump, and Timothy Warner on ways to fortify Windows systems and throw up roadblocks to make ransomware attacks less dangerous.
Posted: 26 Sep 2016 | Published: 21 Sep 2016

Dell Software

Deciphering the Tactics of the Enemy: APT-Style Attacks
sponsored by Dimension Data
EGUIDE: In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data

How Can Internet Hijacking be Prevented or Mitigated?
sponsored by Dimension Data
EGUIDE: In this e-guide learn the benefits of basic cyberhygiene in combating persistent attacks and become more effective in protecting your enterprise's data.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data

Beyond Certificate Management for Enterprises
sponsored by Certified Security Solutions (CSS)
WEBCAST: Discover how to manage PKI, why handling just the digital certificates might not be enough, and some best practices for controlling PKI operations to help reduce risk and improve efficiency. Learn the value of centralizing certificate sources, being able to prevent outages, and more.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

Certified Security Solutions (CSS)
1 - 25 of 799 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement