IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
1 - 25 of 450 Matches Previous Page  |  Next Page
The Anatomy of a DDoS Attack
sponsored by Imperva
RESOURCE: View this infographic to see a visual breakdown of how the DDoS criminal system works and how you can protect your organization.
Posted: 12 Feb 2016 | Published: 09 Dec 2015

Imperva

How to Raise Your IT Availability with Better Virtualization Protection
sponsored by Veeam Software
VIDEO: This webcast gives you solutions for business infrastructure virtualization that enable IT organizations to energize businesses of all sizes.
Posted: 12 Feb 2016 | Premiered: 30 Sep 2015

Veeam Software

Unstructured Data: Friend or Foe?
sponsored by DataGravity
WHITE PAPER: This white paper teaches you how to unlock the value of unstructured data through file analysis, text analysis and visualization.
Posted: 12 Feb 2016 | Published: 27 Jan 2016

DataGravity

A New Approach to Discovery, Security and Compliance for Sensitive Unstructured Data
sponsored by DataGravity
WHITE PAPER: This white paper lays out a best-of-breed solution that is highly integrated providing comprehensive sets of features that solve large security problems.
Posted: 12 Feb 2016 | Published: 27 Jan 2016

DataGravity

Lightboard WildFire vs Standalone Sandboxing
sponsored by Palo Alto Networks
VIDEO: This white paper gives you insight on how to protect against zero-day threats by using both static and dynamic analysis techniques.
Posted: 12 Feb 2016 | Premiered: 17 Oct 2014

Palo Alto Networks

What Security Professionals Need to Know About Open Source Vulnerabilities
sponsored by Black Duck Software
WHITE PAPER: This white paper shows you how to secure and develop open source software effectively and efficiently.
Posted: 12 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Is your sensitive data lurking on the ‘dark Web’?
sponsored by Digital Shadows
WHITE PAPER: This white paper helps you identify and react to the loss or exposure of important information after the fact.
Posted: 12 Feb 2016 | Published: 06 Nov 2015

Digital Shadows

Advancing Network Security through Analytics
sponsored by IBM
WHITE PAPER: In this infographic, uncover the facts of how advanced analytics clears your view into your network to quickly identify real attacks and threats that often go unseen
Posted: 12 Feb 2016 | Published: 30 Dec 2015

IBM

Case Study: Increasing Bandwidth and Security with Next-Gen Firewalls
sponsored by Fortinet, Inc.
CASE STUDY: In this white paper, learn how one leading UK university with 26,000 students increased network security protection with a next-gen firewall (NGFW).
Posted: 11 Feb 2016 | Published: 30 Dec 2014

Fortinet, Inc.

End Point Lightboard
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, you will read about the battle security pros fight every day and what new tools they are using to stop hackers.
Posted: 11 Feb 2016 | Published: 31 Aug 2015

Palo Alto Networks

Using Veeam and VMware vSphere Tags for Advanced Policy-driven Data Protection
sponsored by Veeam Software
WHITE PAPER: This white paper defines activities that will protect workloads based on the “desired state” that their users will define for their workloads.
Posted: 11 Feb 2016 | Published: 31 Dec 2015

Veeam Software

DataGravity and Continuous Sensitive Data Monitoring
sponsored by DataGravity
WHITE PAPER: This white paper discusses tools and technologies that will help in the mitigation, detections and response to risks within your network.
Posted: 11 Feb 2016 | Published: 31 Jul 2015

DataGravity

Data Management in the Modern World
sponsored by DataGravity
WHITE PAPER: This white paper will help you get a handle on securing your data. It offers guidance and solutions to the vexing challenges of managing and protecting all of your organization's important information.
Posted: 11 Feb 2016 | Published: 27 Jan 2016

DataGravity

Zero Trust on the Endpoint
sponsored by Palo Alto Networks
WHITE PAPER: This white paper teaches you a "never trust, always verify" security policy that remedies the deficiencies with perimeter-centric strategies and ensures there's no default trust for any entity or user.
Posted: 11 Feb 2016 | Published: 31 Mar 2015

Palo Alto Networks

Broadening Your VDI Horizon Beyond Thin Client Devices
sponsored by Dell
EGUIDE: This white paper gives you a better understanding of VDI usage over thin client devices and how it can benefit your business.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell

Physical vs. Virtual Desktop Security: It's Just Not The Same
sponsored by Dell
EGUIDE: This e-guide shows you the difference in security methods for virtual and physical desktops. Learn about different techniques and audiences each platform is catered to.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell

Virtual Desktop Security: Exploring VDI Features
sponsored by Dell
EGUIDE: This white paper discusses various virtual desktop security capabilities offered by VDI products. Some of the capabilities described within include encryption, application and role-based policy management and virtual sandboxing.
Posted: 10 Feb 2016 | Published: 02 Feb 2016

Dell

Gartner Market Guide for Data-Centric Audit and Protection
sponsored by Imperva
WHITE PAPER: New Gartner Market Guide for Data-Centric Audit and Protection describes the 5 DCAP capabilities that CISOs need for databases, files, big data, SaaS and IaaS. Download the guide for key findings and recommendations – and find out what Gartner has to say about Imperva DCAP capabilities across data silos.
Posted: 10 Feb 2016 | Published: 15 Dec 2015

Imperva

Layered Security Doesn't Stop Cybercriminals – but VDI Might
sponsored by Dell
EGUIDE: This e-guide discusses ways cybercriminals successfully breach enterprise security and why VDI might be a better approach.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell

Complete Website Security and the Fight Against Organized Cybercrime
sponsored by Symantec Website Security
WHITE PAPER: This white paper explores the numerous types of attacks aiming to take your website down and/or cause a data breach and why organizations can't keep up with this onslaught alone. Read on to find out if comprehensive security could be the answer to blocking malicious threats.
Posted: 10 Feb 2016 | Published: 30 Dec 2015

Symantec Website Security

Why Next-Generation Firewalls and Sandboxes Are Not Enough
sponsored by OpenDNS
WEBCAST: In this webcast, learn the steps of the kill chain to better understand how to bolster your existing defenses against emerging and advanced threats.
Posted: 10 Feb 2016 | Premiered: Feb 18, 2015

OpenDNS

Forrester Endpoint Thought Leadership Paper
sponsored by Palo Alto Networks
WHITE PAPER: This white papers shows solutions that deliver strong integration between network and endpoint security.
Posted: 10 Feb 2016 | Published: 31 Aug 2015

Palo Alto Networks

Advanced Endpoint Protection for Dummies (EBook)
sponsored by Palo Alto Networks
EBOOK: In this eBook, you will read an in-depth examination of today's cyber threat landscape.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Palo Alto Networks

Why it's Time for Locked-Down Desktops
sponsored by Dell
EGUIDE: This e-guide describes the benefits of lock-down desktops and how they can improve your IT security. Lessen support costs and simplify software updates today.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell

Gartner Magic Quadrant for Web Application Firewalls
sponsored by Imperva
WHITE PAPER: Imperva, a leading provider of cyber security solutions is once again the only leader in Gartner's Magic Quadrant for Web Application Firewall—the only company positioned in the leader's quadrant by Gartner in each of the two years this report has been published.
Posted: 10 Feb 2016 | Published: 15 Jul 2015

Imperva
1 - 25 of 450 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement