IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event ManagementReports
126 - 150 of 255 Matches Previous Page  | Next Page
Security Information Management Systems and Application Monitoring
sponsored by SearchSecurity.com
EGUIDE: Did you know your security information management (SIM) system can shed light on application performance issues? This E-Guide details a four-step process for integrating apps into your SIM. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

SearchSecurity.com

6 Point SIEM Solution Evaluation Checklist
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

SearchSecurity.com

SearchSecurity.com University: SIM for Threat Monitoring Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This lesson helps enterprises learn how to catalog the types of threats that they confront, and goes on to identify those which could be addressed through the expedient use of a SIEM approach.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks and what you can do about it.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

Magic Quadrant for Security Information and Event Management
sponsored by Hewlett-Packard Company
WHITE PAPER: View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data.
Posted: 01 Apr 2013 | Published: 24 May 2012

Hewlett-Packard Company

Get actionable insight with security intelligence for mainframe environments
sponsored by IBM
WHITE PAPER: View this white paper to learn more about the importance of alerts with enterprise security. Find out how you can deliver integrated threat analysis, real-time alerts, and audit consolidation to manage today's growing threats. This resource discusses how you can enhance security without increasing overhead.
Posted: 08 Mar 2013 | Published: 08 Mar 2013

IBM

SIM Technical Guide
sponsored by SearchSecurity.com
EZINE: In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.
Posted: 08 Mar 2013 | Published: 08 Mar 2013

SearchSecurity.com

Creating a Network Endpoint Security Policy for Hostile Endpoints
sponsored by SearchSecurity.com
EGUIDE: Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

SearchSecurity.com

Mobile: The Technology Game-Changer in 2013
sponsored by SearchSecurity.com
EGUIDE: TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

SearchSecurity.com

SIEM IT Decision Center- Checklist #2
sponsored by SearchSecurity.com
EGUIDE: This white paper presents SIEM use cases and technical information for security and compliance pros to better understand the threat landscape and help move their RFP process forward.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

SearchSecurity.com

SIEM IT Decision Center- Checklist #1
sponsored by SearchSecurity.com
EGUIDE: If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms.
Posted: 08 Feb 2013 | Published: 01 Jan 2013

SearchSecurity.com

Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
sponsored by SearchSecurity.com
EGUIDE: Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

SearchSecurity.com

Web-facing applications: Security assessment tools and strategies
sponsored by SearchSecurity.com
WHITE PAPER: Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected.
Posted: 08 Oct 2012 | Published: 08 Oct 2012

SearchSecurity.com

Cyber Vulnerability Index 2012
sponsored by ComputerWeekly.com
RESEARCH CONTENT: More than three-quarters of the Forbes 2000 companies leak potentially dangerous data that could be exploited by hackers, this research from KPMG reveals.  The report explains the risks and the actions companies need to take to protect themselves.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Security Information Management Systems Aspire to Real-Time Security
sponsored by Hewlett-Packard Company
EGUIDE: Explore security information management (SIM) systems' capabilities for real-time security, learn why the definition of "real-time" may need altering, and uncover the factors preventing SIMs from attaining real-time status.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

Hewlett-Packard Company

Network Security Technologies Technical Guide
sponsored by SearchSecurity.com
WHITE PAPER: Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.
Posted: 03 Apr 2013 | Published: 31 Dec 2012

SearchSecurity.com

Presentation Transcript: The Top 5 Pitfalls of Log Management and SIEM Deployments and How to Avoid Them
sponsored by eIQnetworks
PRESENTATION TRANSCRIPT: This valuable resource counts down the top 5 pitfalls of log management and security information and event management (SIEM) deployments and offers essential advice for avoiding these challenges and achieving SIEM success.
Posted: 15 Feb 2013 | Published: 04 Feb 2013

eIQnetworks

Presentation Transcript: Content Monitoring in the Enterprise
sponsored by Lumension
PRESENTATION TRANSCRIPT: This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Lumension

Log Management and SIEM: Build a Solid Foundation for Compliance
sponsored by McAfee, Inc.
EGUIDE: This expert e-guide explores how enterprise log management and SIEM tools can be used to build a foundation for ensured compliance in your organizations and offers key tips for choosing the tools that meet your organization's compliance needs – click through to learn more.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

McAfee, Inc.

10 Steps for Early Incident Detection
sponsored by Tripwire, Inc.
WHITE PAPER: The earlier a security breach is detected, the faster an organization can recover. View this informative white paper to learn more about the ten steps to faster detection of security incidents. IT security is only as effective as it's response time, so be sure you're prepared for a breach.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

Tripwire Log Center Product Brief
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

Smart, Visible and Automated: The New Log Management
sponsored by Tripwire, Inc.
WHITE PAPER: View this informative white paper to learn more about moving to a more advanced risk protection policy. Improve your log management capabilities by implementing functionality with SIEM, file integrity monitoring and more!
Posted: 27 Sep 2012 | Published: 28 Sep 2012

Tripwire, Inc.

Magic Quadrant for Security Information and Event Management
sponsored by Hewlett-Packard Limited
WHITE PAPER: View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

Hewlett-Packard Limited

Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Zenprise
WHITE PAPER: With this checklist in hand, you and your organization can embrace consumerization with open arms and reap the many benefits it has to offer while ensuring you are doing the best you can to maintain the manageability and security of employee-owned devices accessing your corporate information.
Posted: 01 Aug 2012 | Published: 31 Jul 2012

Zenprise

Vendor Landscape: Security Information & Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This informative resource demonstrates how organizations can find a SIEM solution and achieve key goals. Other topics explained in this white paper include; understanding the capabilities of SIEM technologies and potential use cases.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

LogRhythm, Inc.
126 - 150 of 255 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement