IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
126 - 150 of 744 Matches Previous Page  |  Next Page
Ransomware: Profitable for Criminals, Hard to Stop for Enterprises
sponsored by ExtraHop
ANALYST REPORT: Can your traditional approaches to security keep up with the bad guys? Learn a more behavior-based approach to detecting ransomware. Discover how this security strategy can grant you better visibility into your environment so you can determine where malware is and where it's been.
Posted: 14 Jul 2016 | Published: 15 Jun 2016

ExtraHop

Salesforce Shield for Healthcare
sponsored by Salesforce.com
WHITE PAPER: Learn how healthcare organizations can secure protected health data in the cloud while meeting compliance and governance requirements.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Salesforce.com

Mobile Threat Prevention Behavioral Risk Analysis
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover what it means to have an advanced approach to comprehensive mobile security. Learn how you can closely monitor new or updated apps installed on the device, use app reputation to eliminate malware false-positives, and more.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Check Point Software Technologies Ltd.

Security Tips for HIPAA-Compliant Cloud Storage and Texting
sponsored by Optum
EGUIDE: Understanding the rules of HIPAA is only the first step. But then, you must ensure your practices – and your vendors – are compliant. Access this e-guide to gain tips and criteria for evaluating cloud storage vendors and texting systems for sensitive healthcare information.
Posted: 13 Jul 2016 | Published: 12 Jul 2016

Optum

Case Study: Defending Mobile Apps from Attacks
sponsored by Arxan
WHITE PAPER: Discover how a leading medical device manufacturer hardened their application protection strategy to allow physicians to securely read and monitor patient data, as well as securely control medical devices using mobile applications. Learn how you can gain similar security benefits for your own applications.
Posted: 12 Jul 2016 | Published: 01 Jun 2016

Arxan

Major Global Bank Secures Their Mobile Applications
sponsored by Arxan
CASE STUDY: Learn how a major global banking leader was able to pave the way for mobile banking security to protect critical cryptography and authentication routines in their app that manages communication with the banking server.
Posted: 12 Jul 2016 | Published: 01 Jun 2016

Arxan

Six Steps to a Better Security Strategy
sponsored by Armor
ANALYST REPORT: This Forrester report provides you six essential steps to create an effective security strategy linked with key business interests and success factors.
Posted: 12 Jul 2016 | Published: 01 Jun 2016

Armor

Stop Future Threats though Careful Examination of the Malware Lifecycle
sponsored by Check Point Software Technologies Ltd.
EGUIDE: This e-guide takes a look at the malware lifecycle and explores how advanced attacks have evolved. Learn how specific advanced attacks work and how you can benefit from studying malware lifecycles to detect and defend against future attacks.
Posted: 11 Jul 2016 | Published: 08 Jul 2016

Check Point Software Technologies Ltd.

Cybersecurity Moves Toward Hybrid Models
sponsored by Dell SecureWorks
WHITE PAPER: Discover why the older "all or nothing" kind of relationship between organizations and information security service providers is giving way to a hybrid model that security professionals can leverage to augment their operations and effectiveness.
Posted: 11 Jul 2016 | Published: 01 Jun 2016

Dell SecureWorks

Are You a Security-First Organization?
sponsored by Armor
WHITE PAPER: Regulations are not intended to tell businesses how to structure their security efforts, they are intended to be used as a guide against which the chosen security structure can be checked. Learn how to better structure your security posture to actually protect your assets rather than just looking like you're protecting them.
Posted: 11 Jul 2016 | Published: 01 Jun 2016

Armor

Securing the Connected Car Ecosystem
sponsored by Arxan
CASE STUDY: Discover how this leading automaker was able to protect their Connected Car environment to mitigate never before seen security risks and stop hackers from injecting malicious code into customers' vehicles.
Posted: 11 Jul 2016 | Published: 01 Jun 2016

Arxan

Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
sponsored by OneLogin
WEBCAST: In this webinar Garrett Bekker, Senior Analyst for 451 Research explores the current state of identity management and discusses some of the emerging access control technologies that can help address these challenges.
Posted: 07 Jul 2016 | Premiered: Jun 1, 2016

OneLogin

Assessing Cybersecurity Risk in a Breached World
sponsored by Infocyte
WHITE PAPER: It's imperative you include regular compromise assessments as part of your information and IT risk management strategy. Enable your operations team to catch what prevention and monitoring technologies miss, and learn how to best mitigate the possible damage that can be caused from persistent compromises before hackers make their move.
Posted: 06 Jul 2016 | Published: 01 Jun 2016

Infocyte

Incident Response Team: Transform Your IR Team From Reactive to Proactive
sponsored by ThreatConnect
WHITE PAPER: Discover how your IR team can become faster and more effective at protecting your network. Unite your people, processes, and technologies across your organization to eliminating barriers between the systems that used to slow you down.
Posted: 06 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

State of Application Security Report
sponsored by Arxan
WHITE PAPER: You know why mobile apps must be secure, now learn why in this white paper. It provides recommendations for how organizations and consumers can minimize the risk of their mobile apps being hacked and how app developers can improve protection.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

Arxan

Security Operations Center: Unite People, Processes, and Technologies Across Your SOC
sponsored by ThreatConnect
WHITE PAPER: Discover how to deepen your threat intelligence, validate it, prioritize it and act on it. Bring together the people, processes, and technologies that comprise your Security Operations Center (SOC) team, and the other teams you partner with on a daily basis. Automate mundane security tasks that slow you down by leveraging tools you already have.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

It’s Time for a “Protect From Within” Mentality
sponsored by Forcepoint
WEBCAST: It's time to realign spending to match the most daunting and damaging threat - the insider. Take an in-depth look at how to establish an insider threat program and protect your organizations most important data.
Posted: 05 Jul 2016 | Premiered: Jun 1, 2016

Forcepoint

First Principles for Network Defenders: A Unified Theory for Security Practitioners
sponsored by Palo Alto Networks
WHITE PAPER: In this paper, we propose that the first principle for all network defenders is to prevent high-risk material impact to the organization. The three essential tasks that support the first principle are: threat prevention, threat detection, and threat eradication.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

Palo Alto Networks

Technologies to Thwart Insider Threats
sponsored by Forcepoint
WEBCAST: Two factors drive the insider threat problem - user behavior and data movement. Technology that can monitor, record and replay unusual activity while defeating unsanctioned transfers of data best protect you from data loss. Learn how the right tools can keep your data and employees safe.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Forcepoint

A Business Case For Funding Your Insider Threat Program
sponsored by Forcepoint
WHITE PAPER: Insider threat is a growing issue that often exceeds expectations. While most organizations go to great lengths implementing background checks to vet employees; often the accidental insider and outsider turned insider (due to compromise), are overlooked. It is time for a new protect from within mentality.
Posted: 01 Jul 2016 | Published: 01 Jun 2016

Forcepoint

Endpoint threat detection gets more response
sponsored by Hewlett Packard Enterprise
EGUIDE: Discover how security teams worldwide are attempting to stop cyber-threats using various security methods and endpoint tools. InfoSec professionals have to evaluate what's best for their organizations and make the best judgment at the time -- knowing full well that today's security approach may become tomorrow's liability.
Posted: 07 Jul 2016 | Published: 06 Jul 2016

Hewlett Packard Enterprise

Advantages vs. Disadvantages of Taking a "Hack Back" Approach to Cyber Crime
sponsored by Hewlett Packard Enterprise
EGUIDE: This e-guide discusses hacking back as a viable option to combat hacking attempts. Expert Kevin Beaver discusses the merits and drawbacks of an "offense is the best defense" approach to security and how to implement more permanent security tools moving forward.
Posted: 07 Jul 2016 | Published: 24 Jun 2016

Hewlett Packard Enterprise

Intelligent Endpoint Threat Defense
sponsored by Intel Security
PODCAST: Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Intel Security

Intelligent Endpoint Threat Defense
sponsored by Intel Security
WEBCAST: Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Intel Security

Intelligent Endpoint Threat Defense
sponsored by Intel Security
TRANSCRIPT: Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.
Posted: 01 Jul 2016 | Published: 01 Jun 2016

Intel Security
126 - 150 of 744 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement