IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
126 - 150 of 779 Matches Previous Page  |  Next Page
IT Guide: Windows 10 Migration Minus The Complexity
sponsored by Druva Software
WHITE PAPER: In just six steps, you can leverage endpoint data protection to help you ease into OS migration. Learn how to craft a migration plan that drastically simplifies the OS refresh process and provides comprehensive data protection and governance foundation for your organization.
Posted: 16 May 2016 | Published: 31 Dec 2015

Druva Software

SOC Blog
sponsored by Citrix
RESOURCE: This report contains detailed information about the design and operation of shared file systems put in place to protect customer data. Access now to learn how you can provide greater customer security assurance.
Posted: 16 May 2016 | Published: 10 Mar 2016

Citrix

How ShareFile Works to Prevent Data Loss and Meet Compliance Requirements
sponsored by Citrix
RESOURCE: To prevent costly data leakage, data loss prevention tools must be integrated into your file sharing system. This will enable you to put restrictions on what information can leave your network giving you full visibility into your data's whereabouts. Learn more about content-aware sharing to better protect your organization.
Posted: 16 May 2016 | Published: 12 May 2015

Citrix

Practical Guide to IT Security Breach Prevention Part II
sponsored by Kaspersky Lab
EBOOK: With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints than ever before. Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task.
Posted: 16 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Barracuda NextGen Firewalls protect the ever-expanding operation of Georgia’s leading telecoms provider, Geocell
sponsored by Barracuda Networks
RESOURCE: Geocell chose a next-generation firewall that fit every criteria and beyond. Within only two months, business-critical apps were running smoothly and network management controls were centralized. Learn more about how Geocell's experiences could benefit your network.
Posted: 16 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Security and availability in extremely adverse environments
sponsored by Barracuda Networks
RESOURCE: Exalo Drilling chose a next-generation firewall to protect their growing infrastructure. The centralized management, application awareness and overall efficiency exceeded their expectations. Learn more about how their experience could benefit your organization's IT infrastructure.
Posted: 16 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Prevent Data Loss with Exabeam
sponsored by Exabeam
WHITE PAPER: User behavior analytics (UBA) provides the context needed to evaluate user behavior accurately and efficiently. It focuses on the user handling the data rather than the data itself. Learn how you can pair your DLP tools with UBA to best prevent data loss and exfiltration.
Posted: 16 May 2016 | Published: 01 Apr 2016

Exabeam

Gartner Magic Quadrant for Enterprise Data Loss Prevention
sponsored by Intel Security
ANALYST BRIEF: This report gives you strengths and weaknesses from some of today's best (and worst) integrated data loss prevention (DLP) vendors to help you choose the right DLP solution aligned with your organization's particular security pain points.
Posted: 13 May 2016 | Published: 28 Jan 2016

Intel Security

Stop Data Exfiltration
sponsored by Intel Security
RESOURCE: Gain insight into hackers' motivations and understand which pieces of information are most valuable for them to steal (chances are they're the same ones most valuable to you). Go in depth into data exfiltration secrets to better understand the complexities of how a network is breached and robbed of personal, corporate, and customer information.
Posted: 13 May 2016 | Published: 01 Apr 2016

Intel Security

What’s the Problem? Overcoming 4 Key Challenges in Data Privacy
sponsored by Iron Mountain
WHITE PAPER: Learn the 4 key challenges in data privacy and how to overcome them. Data privacy must be protected on a continuous basis far beyond the requirements of passing compliance audits.
Posted: 13 May 2016 | Published: 01 Apr 2016

Iron Mountain

5-Step Guide For GDPR Compliance
sponsored by Druva Software
WHITE PAPER: This white paper shows you a 5-point plan to prepare your organization to meet the new needs of data protection regulations. Learn how to track the creation of new files on laptops and other mobile devices and automatically ensure that files containing customer data and PII are protected.
Posted: 13 May 2016 | Published: 01 Apr 2016

Druva Software

IT Guide: Protecting Corporate Data Beyond the Firewall
sponsored by Druva Software
WHITE PAPER: 24/7 data monitoring can ensure your important information stays on devices and on networks that you deem safe. Learn how to be proactive in your compliance requirements and stay on top of how your data is handled.
Posted: 13 May 2016 | Published: 01 Apr 2016

Druva Software

Symantec Data Loss Prevention for Cloud
sponsored by Symantec Corporation
DATA SHEET: Not only can you keep total visibility of your enterprise data, but also gain new capabilities to increase workflow. Access now to discover how data loss prevention can secure your cloud data and automate incident response processes and remediation.
Posted: 13 May 2016 | Published: 31 Dec 2015

Symantec Corporation

Everything You Need to Know About Crypto Management
sponsored by Gemalto
WHITE PAPER: The best way to secure sensitive information is by placing safeguards around the data itself through encryption. Learn how to better manage your encrypted data to enable greater security enforcement and overall better efficiency.
Posted: 13 May 2016 | Published: 01 Apr 2016

Gemalto

Secur ing Productivity in the Border less Enterprise
sponsored by Microsoft
WHITE PAPER: The combination of cloud and mobility can allow for great employee productivity and greater customer responsiveness. However, these new business opportunities mean nothing if you can't protect against the new security challenges they bring.
Posted: 13 May 2016 | Published: 01 Apr 2016

Microsoft

Why a Modern Security Architecture Matters
sponsored by Palo Alto Networks
WHITE PAPER: Discover the benefits of an integrated, unified security architecture over the sequential, additive approaches that have evolved the industry. Understand the ability of security architectures to address modern threats while supporting the use of new applications.
Posted: 13 May 2016 | Published: 01 Apr 2016

Palo Alto Networks

Protecting Threats in a Small Business Environment
sponsored by CDW
WHITE PAPER: Access this white paper for insights on how small businesses can more efficiently handle their security infrastructure. Even without an extensive IT staff, small businesses can deploy a robust, easy-to-manage security platform protecting your data and your reputation.
Posted: 13 May 2016 | Published: 01 Apr 2016

CDW

Internet Security Threat Report: Healthcare
sponsored by Symantec Corporation
EBOOK: This thorough 108-page threat report examines multiple facets of today's threat landscape including targeted attacks, smartphone threats, social media scams and IoT vulnerabilities to help you secure your healthcare system effectively now and into the future.
Posted: 12 May 2016 | Published: 01 Apr 2016

Symantec Corporation

Gartner Magic Quadrant for Endpoint Protection Platforms
sponsored by Intel Security
ANALYST REPORT: This Magic Quadrant report direct from Gartner investigates the quality of endpoint protection platforms, capabilities, the depth of features and the ease of control from current endpoint vendors to help you decide the proper endpoint security platform for your organization (and your budget).
Posted: 12 May 2016 | Published: 01 Feb 2016

Intel Security

Gartner Magic Quadrant for Mobile Data Protection Solutions
sponsored by Intel Security
ANALYST REPORT: Access now to learn the pros and cons of mobile security vendors as Gartner's Magic Quadrant for Mobile Data Protection Solutions dissects the current MDP vendor landscape so you can best understand which company can most effectively help you out if you're looking to bolster your mobile data protection initiatives.
Posted: 12 May 2016 | Published: 01 Oct 2015

Intel Security

Staying out of the next Data Breach Headline
sponsored by Intel Security
VIDEO: Learn about outbound data protection as your last line of defense against data exfiltration. Discover how you can achieve greater DLP, disk encryption and device control to from wherever your data lives.
Posted: 12 May 2016 | Premiered: 28 Apr 2016

Intel Security

Practical Guide to IT Security Breach Prevention Part I
sponsored by Kaspersky Lab
WHITE PAPER: For your security policies to be effective, they need to bring all devices and applications under IT control and regulate user behavior. Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task.
Posted: 12 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Endpoint Encryption Keeps Your Data Safe
sponsored by Intel Security
WHITE PAPER: Discover customizable solutions to keep your enterprise data safe using endpoint encryption. Confidently ensure consistent and persistent data protection across all your network devices with a proven solution that allows you to secure data on office desktop PCs, Macs, mobile laptops, VDI workstations.
Posted: 12 May 2016 | Published: 01 Apr 2016

Intel Security

IT Security Vendor Analysis by Bizety
sponsored by Distil Networks
WHITE PAPER: This white paper examines five major vendors and evaluates their security solutions. Learn how well they can coordinate their systems to successfully secure your web infrastructure and online data.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks

13 Questions You Must Ask Your Bot Mitigation Vendor
sponsored by Distil Networks
WHITE PAPER: Discover 13 tips to help you differentiate between vendors to make a fully informed decision when it comes to your web application security.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks
126 - 150 of 779 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement