IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
126 - 150 of 581 Matches Previous Page  |  Next Page
Definitive eGuide: Mobility and IoT cuasing IT headaches? Connect and protect with Adaptive Trust
sponsored by Aruba Networks
WHITE PAPER: This white paper outlines the pre-planning and deployment steps needed to help guide you on your journey of enterprise BYOD and IoT. Learn how greater visibility and the integration of your policy decision engine with third-party security solutions can enhance your ability to offer end-to-end mobile protection.
Posted: 22 Mar 2016 | Published: 01 Feb 2016

Aruba Networks

The New Network Security Front Line
sponsored by Ixia
WEBCAST: In this brief video, learn how to decrease your network's attack surface to minimize the number of threats that can potentially breach your defenses.
Posted: 18 Mar 2016 | Premiered: Jan 6, 2016

Ixia

Mitigating and Protecting SAP and ERP Vulnerabilities
sponsored by Onapsis
EGUIDE: This e-guide discusses the more than 95% of SAP systems that are exposed to vulnerabilities and could lead to a detrimental compromise of enterprise data and processes. Access this resource now and learn how to train your staff about security risks to adopt an end-to-end security approach.
Posted: 16 Mar 2016 | Published: 14 Mar 2016

Onapsis

The Cyber Threat Guide
sponsored by LogicNow
EBOOK: This e-book describes the types of attacks a typical network faces and offers some of the successful mitigation strategies IT professionals have used against them. Use this as a tool to design your defense-in-depth strategy.
Posted: 16 Mar 2016 | Published: 01 Feb 2016

LogicNow

Solving the Top 11 API Threats
sponsored by Axway
WHITE PAPER: This white paper explores how to learn from failure, improve pattern recognition of security quality and detect possible security vulnerabilities.
Posted: 16 Mar 2016 | Published: 01 Feb 2016

Axway

API Security Checklist
sponsored by Axway
WHITE PAPER: This infographic shares with you 11 ways to guard your enterprise entry points. Look it over and make the changes necessary to ensure a more secure API deployment for your business.
Posted: 16 Mar 2016 | Published: 31 Dec 2015

Axway

Manufacturing: 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This white paper offers a high-level overview of major threats trending across businesses worldwide over the past year. View now for insight into the current threat landscape for the manufacturing industry and offers solutions that can help you better protect your organization.
Posted: 16 Mar 2016 | Published: 31 Dec 2015

IBM

Report: Modern Threat Intelligence
sponsored by IBM
WHITE PAPER: The complexities of doing business at scale, both strategic and technical, create barriers in preventing breaches. Uncover ways to focus on user education and systematic protocols for operating a strong risk assessment program, allowing you to overcome these barriers.
Posted: 15 Mar 2016 | Published: 29 Feb 2016

IBM

2016 Cyberthreat Defense Report
sponsored by Imperva
WHITE PAPER: You will learn how your spend compares to that of other organizations, what defense measures your peers have in place to defend against internal and external threats, and why weaknesses in your strategy could make your organization a "low hanging fruit".
Posted: 14 Mar 2016 | Published: 24 Feb 2016

Imperva

Financial Services Industry: 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This report offers a high-level overview of the major threats trending across businesses worldwide over the past year. Access now for insight into the current threat landscape for the financial services industry and offers solutions that can help you better protect your organization overall.
Posted: 14 Mar 2016 | Published: 31 Dec 2015

IBM

The Rise of Ransomware & How to Defend Against It
sponsored by Sentinel Labs, Inc.
EGUIDE: This white paper teaches you how ransomware operates and what you can do to ensure you don't become a victim. Download now and learn how to avoid infection and how to remedy your endpoints if you are infected.
Posted: 14 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

Uncovering the Risk of SAP Cyber Breaches
sponsored by Onapsis
WHITE PAPER: Access this SAP research paper to understand the threat of an SAP cyber breach and how organizations are managing the risk of information threat, modification of data and disruption of business processes. Learn from businesses that have been breached an average of two times in the past 24 months.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Onapsis

Four top cyber crime trends
sponsored by IBM
WHITE PAPER: This report provides insight into the security issues of today's IT environment. While incidents around the globe are diverse, most of them share certain characteristics and fit recurring patterns.
Posted: 11 Mar 2016 | Published: 31 Dec 2015

IBM

Real-Time, Unified Endpoint Protection: A New Era in Incident Response
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper teaches you about the only endpoint protection platform that natively integrates prediction, prevention, detection and response. Save considerable time, money and energy while simultaneously improving your overall security posture.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

Replacing Antivirus, and Doing it Right: A CISO Response
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper shows you how to successfully execute a complete antivirus replacement. Access now and learn how to make a daunting task into a simple project with the right careful planning, frequent communication and stakeholder buy-in.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

EMC DATA PROTECTION SUITE 2015
sponsored by EMC & NextNet
WHITE PAPER: In this white paper, you will learn how you can better protect data residing throughout your enterprise. Access this resource now and find out how you can gain flexibility to quickly optimize performance while saving your organization money.
Posted: 11 Mar 2016 | Published: 31 Oct 2015

EMC & NextNet

How to Handle a Ransomware Hijacking
sponsored by ESET
WHITE PAPER: This white paper reinforces the important precautions of secure mobile management in the enterprise. Uncover the global state of ransomware attacks, preventative measures you can take, and what to do if your organization gets infected.
Posted: 09 Mar 2016 | Published: 09 Mar 2016

ESET

Security attacks on industrial control systems
sponsored by IBM
WHITE PAPER: This white paper examines the history of industrial control systems (ICS), the susceptibility of these systems to certain attacks and how the systems can be defended.
Posted: 17 Mar 2016 | Published: 31 Oct 2015

IBM

Security trends in the manufacturing industry
sponsored by IBM
WHITE PAPER: This white paper shows you statistics about cyberattack in the manufacturing industry and how they resulted. Learn some manufacturing best practices and securements to better protect any exploitable weaknesses in your organization's infrastructure.
Posted: 16 Mar 2016 | Published: 29 Feb 2016

IBM

Security trends in the retail industry
sponsored by IBM
WHITE PAPER: In this white paper, you will learn about different methods hackers use to steal customer data as well as statistics showing what time of year attacks are most prevalent. Learn how to defend yourself against hackers and how to respond if a breach does take place in your network.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

IBM

Security trends in the healthcare industry
sponsored by IBM
WHITE PAPER: This white paper gives you the latest statistics on healthcare-related security breaches and how you can avoid becoming a statistic yourself by falling victim to attack. Learn about the most common cyberattacks against healthcare organizations and how to patch vulnerabilities you may have in your network.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

IBM

Top 5 Benefits of a Security Operations Center
sponsored by IBM
WHITE PAPER: This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise SOC.
Posted: 14 Mar 2016 | Published: 31 Dec 2013

IBM

The price of loyalty programs
sponsored by IBM
WHITE PAPER: This white paper shows you how to implement a loyal program for your customers and minimize the chance of account breaches. Learn how to diligently monitor your network and how to detect signs of attacks.
Posted: 14 Mar 2016 | Published: 30 Nov 2015

IBM

It's time to tackle IoT security
sponsored by Ruckus Wireless
EGUIDE: The forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.
Posted: 09 Mar 2016 | Published: 07 Mar 2016

Ruckus Wireless

How can proper BYOD and IoT device onboarding improve
sponsored by Ruckus Wireless
EGUIDE: This e-guide explores the growing threat landscape for BYOD and IoT devices. Learn the reality behind what risks your network faces and how to mitigate potential threats.
Posted: 09 Mar 2016 | Published: 07 Mar 2016

Ruckus Wireless
126 - 150 of 581 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement