IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
101 - 125 of 698 Matches Previous Page  |  Next Page
Timeline of Disruption- A history of disrupting the business of hacking
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn about the history of enterprise security: from its conception until today. See how hacking has disrupted business innovation over the years and understand why your organization must continue to innovate fearlessly.
Posted: 15 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise

Value of QRadar QFlow and VFlow Collector Technology for Security Intelligence
sponsored by IBM
WHITE PAPER: With the growing amount of threats in today’s IT landscape, businesses have bolstered their network security with greater visibility methods. This guide explores the importance of network data when it comes to protecting your IT system.
Posted: 15 Jun 2016 | Published: 31 Jan 2013

IBM

How business innovations meet the business of hacking
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Hackers are sophisticated but what does that mean for your business? Explore the business of hacking. Discover the different ways cybercriminals make money, their motivations and different hacking organizations.
Posted: 14 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise

Log Monitoring & Analysis: Strengthen Information Security While Respecting User Privacy
sponsored by Intersect Alliance
EGUIDE: Log monitoring and analysis tools can be used to bolster information security and improve incident response without infringing on user privacy. In this expert e-guide, security pros evaluate options based on criteria such as alerts and reporting capabilities.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intersect Alliance

Recognize Your Security Shortcomings and Address Them with Confidence
sponsored by Dell, Inc.
EGUIDE: This e-guide highlights the current state of data security among businesses of all sizes. Learn about the concerns adopting a cloud-based infrastructure raises and how to confidently secure your IT environment overall.
Posted: 13 Jun 2016 | Published: 21 Mar 2016

Dell, Inc.

Most Effective Security Technologies and Practices
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how understanding the business of hacking and how cybercriminals profit can help you develop a successful security strategy.
Posted: 13 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise

Supporting European Internet Payment Security Guidelines - July 2015 – WHITE PAPER
sponsored by IBM
PRODUCT OVERVIEW: You must take a holistic approach to cyber security to prevent, detect and respond to advanced and evolving threats in real-time. Learn how to conduct extensive research to thoroughly understand the origins and distinctive features of attackers. This allows you to pinpoint, outsmart and stop them from their source.
Posted: 13 Jun 2016 | Published: 01 May 2016

IBM

How to Protect Our Digital World from Cyber Attacks
sponsored by IBM
VIDEO: Our digital world is under attack. But you can fight back. Adaptive threat intelligence allows you to gather information from all your devices and develop countermeasures against malware for the future. It's not enough to be ready for yesterday's attacks; it's about staying one step ahead of the bad guys throughout the entire cybercrime arms race.
Posted: 13 Jun 2016 | Premiered: 14 May 2014

IBM

The State of Incident Response
sponsored by ServiceNow
RESEARCH CONTENT: Take a close-up look at the current practices and challenges associated with incident response processes and technologies. Browse through tips from IT leaders to guide your security framework.
Posted: 13 Jun 2016 | Published: 29 Feb 2016

ServiceNow

Make EMM Part of a Broader Mobile Enterprise Strategy
sponsored by Microsoft
EGUIDE: If management is the centerpiece of your mobile enterprise strategy, you're doing it wrong. Learn how adding MAM and MCM capabilities to your EMM strategy can help you enforce mobile security policies, but also enable your workers to be more productive, transforming how your business operates.
Posted: 10 Jun 2016 | Published: 03 Jun 2016

Microsoft

Fraud risk engines strike back
sponsored by IBM
WHITE PAPER: Discover how to approach fraud detection in a new way. You must base your stance on three core principles —visibility, a global threat intelligence network, and agility by design. By using this approach, you can significantly reduce the number of false positives and can improve customer satisfaction.
Posted: 10 Jun 2016 | Published: 01 Feb 2016

IBM

Fraud protection doesn't have to be an uphill battle
sponsored by IBM
WHITE PAPER: You can simplify the fraud protection process while reducing time and cost. Learn how to achieve greater visibility and adaptability across the fraud management lifecycle and discover highly effective intelligence- and evidence-based fraud detection with fewer false positives.
Posted: 10 Jun 2016 | Published: 01 May 2016

IBM

Few Fully Prepared for Software Security Risks
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper shows you results from a recent security survey and the value of testing your security measure regularly.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Hewlett Packard Enterprise

Companies Cautiously Optimistic about Cybersecurity
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover the realistic possibilities of your business experiencing an attack and what you can do to prepare your network. Uncover 5 action items for security pros, 4 "bad guys" to look out for, and much more.
Posted: 10 Jun 2016 | Published: 27 Jan 2016

Hewlett Packard Enterprise

Preventing Fraud Before Customers Become Affected
sponsored by IBM
WHITE PAPER: Learn how Pulaski Bank achieved the layered security and malware prevention they were looking for and how their struggles can benefit your organization. Not only will you prevent potential fraud, but also increase customer awareness.
Posted: 09 Jun 2016 | Published: 01 May 2016

IBM

Masergy Unified Enterprise Security Demo
sponsored by MASERGY
WEBCAST: Access this webcast to discover how machine learning combined with continuous human monitoring can harden your defenses and improve your advanced threat detection capabilities.
Posted: 09 Jun 2016 | Premiered: May 1, 2016

MASERGY

The pitfalls of two-factor authentication
sponsored by IBM
WHITE PAPER: Discover the shortcomings of two-factor authentication, including its inability to defend against theft and transaction signings. Learn how a better layered security approach can help identify the root cause of malware and help protect high-value transactions.
Posted: 08 Jun 2016 | Published: 01 May 2016

IBM

Security Solutions for Mobile Users in the Workplace
sponsored by HID
EBOOK: This e-book describes the security landscape for mobile devices and how near field communications can improve the user experience on mobile devices while allowing companies to protect their assets and manage costs efficiently.
Posted: 07 Jun 2016 | Published: 31 Dec 2015

HID

Reporting Cybersecurity to the Board
sponsored by BitSight
WHITE PAPER: Today, boards have to consider the regulatory, fiduciary, organizational, and personal liability that could come from a data breach. Download this free guide today, and you'll have everything you need for your next board presentation to hit all the right points.
Posted: 07 Jun 2016 | Published: 01 May 2016

BitSight

Revealing Security Performance Metrics Across Major World Economies
sponsored by BitSight
WHITE PAPER: In its latest research report, BitSight studied the security performance of companies per country with more than 50% of their IP space in: The United States, United Kingdom, Germany, Brazil, China and Singapore.
Posted: 07 Jun 2016 | Published: 01 May 2016

BitSight

Mobile Malware
sponsored by MobileIron
WHITE PAPER: Four major threats are currently targeting iOS and Android devices using very clever tactics. Learn how these new malware tools are infecting mobile devices today and how you can secure your data against these and other growing threats.
Posted: 07 Jun 2016 | Published: 01 May 2016

MobileIron

Improving payment Card Compliance
sponsored by Verizon
WHITE PAPER: Learn how the bank was able to secure customer data in a cost-efficient manner by focusing on the most important applications. With ongoing consulting, the bank can maintain the strong PCI stance it has built and continue to earn customer trust while driving business growth.
Posted: 07 Jun 2016 | Published: 01 May 2016

Verizon

Secure your mobile devices, data and apps
sponsored by Verizon
WHITE PAPER: This white paper teaches you how to assess your existing security policies, giving you advice on potential weaknesses and best practices to strengthen your mobile security. Get better peace of mind with policies that keep data, devices and apps in line no matter where your workforce roams.
Posted: 07 Jun 2016 | Published: 01 May 2016

Verizon

Masergy Customer turned Evangelist, Stuart Carrothers talks Masergy
sponsored by MASERGY
WEBCAST: In this video, you'll discover a security vendor that wants to work with you for the lifetime of your organizations. From them, you'll get real-time visibility and change bandwidth as you need it. Learn about largest global network in the world based on software defined networking.
Posted: 07 Jun 2016 | Premiered: May 1, 2016

MASERGY

Security Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.
Posted: 13 Jun 2016 | Premiered: May 1, 2016

Intel Security
101 - 125 of 698 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement