IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
101 - 125 of 713 Matches Previous Page  |  Next Page
Ransomware: A Hostage Rescue Manual
sponsored by KnowBe4
WHITE PAPER: Learn the different types of ransomware, how to spot them and how to prevent an attack against your files. Should you become infected, learn the steps you must take to best protect your assets and how to avoid future ransomware attacks.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Ransomware: Mitigating the Threat
sponsored by Zerto
WHITE PAPER: Discover more about recent advancements in ransomware, where it's going and what you can do you protect your files. Learn steps you must take before a ransomware attack hits to ensure its crippling effects don't threaten your business.
Posted: 07 Dec 2016 | Published: 30 Nov 2016

Zerto

Turn IAM from a Roadblock into a Business Enabler
sponsored by IBM
VIDEO: Learn how to stop the monotony of IAM, and instead turn it into a business enabler. Discover how identity-as-a-service (IDaaS) can help you reduce costs by 60%, onboard SaaS apps faster, and generate access management from a single screen.
Posted: 07 Dec 2016 | Premiered: 30 Nov 2016

IBM

Buyers guide to cloud based I&M mgmt
sponsored by IBM
RESOURCE: Learn how to make the most informed decision about your next enterprise grade IDaaS provider with this interactive buyer's guide.
Posted: 07 Dec 2016 | Published: 30 Nov 2016

IBM

Demo: Next-Gen Antivirus in Action
sponsored by Carbon Black
WEBCAST: Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.
Posted: 05 Dec 2016 | Premiered: Nov 30, 2016

Carbon Black

Reasonable Security Best Practices: Learning From Notable Data Breaches
sponsored by Global Knowledge
WHITE PAPER: Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a data breach. But what is "reasonable security," and is there a definition?
Posted: 01 Dec 2016 | Published: 28 Nov 2016

Global Knowledge

5 Questions to Ask Data Protection Vendors
sponsored by Commvault
WHITE PAPER: Protecting your data is paramount to your business continuity and success, so you should be asking the tough questions to any data protection vendor you're considering. Discover 5 questions to ask data protection and information management vendors.
Posted: 01 Dec 2016 | Published: 30 Nov 2016

Commvault

Comparing Data Protection and Information Management Vendors
sponsored by Commvault
WHITE PAPER: Uncover a comparison of two data protection and information management vendors (Veeam and Commvault). Learn how they compare on 5 important factors that you should be considering when looking to purchase data protection and information management.
Posted: 30 Nov 2016 | Published: 31 Oct 2016

Commvault

Important Considerations for Comparing Data Protection Vendors
sponsored by Commvault
WHITE PAPER: What should you look for when comparing data protection vendors? Discover how factors like the scope of your data, cloud storage and, most importantly, risk should affect your decision.
Posted: 30 Nov 2016 | Published: 31 Oct 2016

Commvault

A CIO’s Guide for Reducing Security Anxiety
sponsored by BitSight
WHITE PAPER: Discover how to get the full picture of your organization's security performance compared to your peers. Learn why benchmarking is so critical for today's CIOs and how to clearly communicate benchmarking data to your board.
Posted: 28 Nov 2016 | Published: 31 Oct 2016

BitSight

The Future of Security: Advanced Security Analytics
sponsored by LogRhythm, Inc.
EGUIDE: As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.
Posted: 23 Nov 2016 | Published: 22 Nov 2016

LogRhythm, Inc.

The Future Of Data Security And Privacy: Growth And Competitive Differentiation
sponsored by Absolute
ANALYST REPORT: Data security and privacy is a competitive differentiator in today's data-centric business environments. In this Forrester report, learn how to put security closer to your data and gain that competitive advantage over your peers. Get greater visibility to control access to resources and watch user behavior diligently.
Posted: 22 Nov 2016 | Published: 07 Jul 2016

Absolute

3 File Transfer Mistakes that Could Be Costing You and Putting Data at Risk
sponsored by Globalscape
WHITE PAPER: IT teams are busy and there's little time for planning. When details get lost in the shuffle, mistakes happen that can carry a heavy price.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Globalscape

10 Reasons You Should Consider Commvault for Data Protection
sponsored by Commvault
WHITE PAPER: Discover how to make the right choices in data center backup and recovery software. You'll learn 10 reasons why choosing the right vendor is critical to your organization's future and how to be prepared for virtually every technology transition ahead.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Commvault

From Reactive to Proactive: How to Avoid Alert Fatigue
sponsored by ThreatConnect
WHITE PAPER: Learn how to prioritize security alerts and reduce alert fatigue. Discover how to achieve active response, allowing you to respond to attacks as quickly as they are detected.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

ThreatConnect

Container Security: How to Secure Enterprise Container Stacks
sponsored by NeuVector
EGUIDE: Learn the basics of container security and how to best secure your container stacks. Discover tools available to plug potential security holes and strategies to keep your organization secure.
Posted: 05 Dec 2016 | Published: 02 Dec 2016

NeuVector

Basic SIEM Analytics Steps to Know
sponsored by LogRhythm, Inc.
EGUIDE: This e-guide outlines a beginning for your SIEM implementation strategy. By breaking down SIEM analytics into steps, you can provide your enterprise with improved security management.
Posted: 22 Nov 2016 | Published: 22 Nov 2016

LogRhythm, Inc.

Modern Snapshot Management - Enhancing Application Protection and Recovery
sponsored by Commvault
WHITE PAPER: Discover how to unlock the power within your current hardware investments, improving recovery across all applications and delivering faster and more granular application-aware recovery performance.
Posted: 22 Nov 2016 | Published: 31 Dec 2015

Commvault

Create a Customized Testing Strategy
sponsored by IBM
WHITE PAPER: Learn the importance of thorough penetration testing. Discover how to ensure each of the four disciplines are covered, and how each play a crucial role in securing your organization.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

IBM

Optimize Your SIEM Operations
sponsored by Intel Security
RESOURCE CENTER: Access articles detailing everything from common mistakes made in SIEM application to maturing and specializing your enterprise's approach to breach mitigation and recovery.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

Intel Security

Resource Center: Stop Threats and Prevent Data Loss
sponsored by Intel Security
RESOURCE: Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
Posted: 21 Nov 2016 | Published: 30 Sep 2016

Intel Security

Resource Center: How to Safeguard Data
sponsored by Intel Security
RESOURCE: This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Intel Security

Mitigate Security Risks with Hyperconverged Infrastructure
sponsored by SimpliVity
WHITE PAPER: Improve your security posture and best mitigate risks by implementing comprehensive security measures across your entire enterprise - from the network perimeter to the application layer. Discover how a hyperconverged infrastructure limits potential points of attack and consolidates security controls.
Posted: 18 Nov 2016 | Published: 31 Dec 2015

SimpliVity

SIEM Analysis Interfaces for Security Professionals
sponsored by LogRhythm, Inc.
EGUIDE: This expert e-guide explains how you can avoid SIEM errors by implementing an analysis interface in your SIEM system to ease assessment and interpretation tasks for security professionals.
Posted: 18 Nov 2016 | Published: 16 Nov 2016

LogRhythm, Inc.

In-Depth Reviews for SIEM Buyers
sponsored by AlienVault
WHITE PAPER: Explore a collection of resources and reports that dive deep into what a SIEM solution needs to provide and how to evaluate the right solution for your organization. Specifically, get an overview and third-party reviews for AlienVault's SIEM platform.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

AlienVault
101 - 125 of 713 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement