IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event ManagementReports
126 - 150 of 335 Matches Previous Page  | Next Page
Information Security Services: Preparing for Distributed Denial of Service (DDoS) Attacks
sponsored by Dell SecureWorks
WHITE PAPER: This essential whitepaper explores the current state of DDoS attacks and outlines why you need a proactive prevention strategy.
Posted: 01 Apr 2014 | Published: 28 Feb 2011

Dell SecureWorks

Accelerating Incident Response and Reducing Security Risks
sponsored by Dell SecureWorks
WHITE PAPER: This essential whitepaper outlines the advantages of managed security services providers and how your incident response strategy is essential to your overall security plan.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Dell SecureWorks

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 20 Mar 2014 | Published: 31 May 2013

IBM

Securosis Report: Replacing Your SIEM with Security Management 2.5 Yet?
sponsored by IBM
WHITE PAPER: This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment.
Posted: 06 Mar 2014 | Published: 01 Feb 2014

IBM

Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
sponsored by IBM
WHITE PAPER: This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Leverage Security Intelligence for Government Agencies
sponsored by IBM
WHITE PAPER: This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
Posted: 05 Mar 2014 | Published: 31 Mar 2013

IBM

IBM QRadar Security Intelligence: Perception Capture Study
sponsored by IBM
WHITE PAPER: This Ponemon Institute report highlights the capabilities and benefits of one security incident event management (SIEM) solution.
Posted: 05 Mar 2014 | Published: 28 Feb 2014

IBM

Five Steps to Building Visibility and Security Into Your Network
sponsored by Ixia
WHITE PAPER: Discover five steps you need to take to not only build visibility and security into your network, but also get the most out of your current monitoring investments.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Ixia

Critical Capabilities for SIEM
sponsored by IBM
ANALYST REPORT: In this Gartner report, unveil a vendor comparison of the top 13 security information and event management (SIEM) offerings in the market today, and learn which capabilities are drawing businesses' attention.
Posted: 24 Feb 2014 | Published: 07 May 2013

IBM

Closing the Circle: How to Get Manageable Endpoint, Mobile Device and Web Security Together
sponsored by IBM
WHITE PAPER: This whitepaper discusses why it is necessary to implement security solutions that protect endpoints and mobile devices together, and to discover one company's suggestions for ameliorating this area of vulnerability within your organisation.
Posted: 24 Feb 2014 | Published: 20 Mar 2013

IBM

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Making a Business Case for Fraud Prevention Technology
sponsored by IBM
WHITE PAPER: This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

IBM

A UK Security Provider Fortifies its Systems for Greater Resiliency
sponsored by IBM
CASE STUDY: This informative case study explores one company's success with a disaster recovery plan and how it sought business continuity while ensuring security.
Posted: 08 Apr 2014 | Published: 31 Dec 2012

IBM

Deciphering the truth about Big Data hype and security intelligence
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this whitepaper, Randy Franklin Smith of UltimateWindowsSecurity.com discusses the key tenets of the realationship between Big Data and security information and event management.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Hewlett-Packard Limited

Buyer's Criteria for Next-Generation Network Security
sponsored by Sourcefire
WHITE PAPER: This whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Unified Security Management: Real-time Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014

AlienVault

Leveraging Security Intelligence for Energy and Utilities Companies
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 24 Mar 2014 | Published: 31 Jul 2013

IBM

Secunia Vulnerability Review 2014
sponsored by Secunia
WHITE PAPER: This guide reviews vulnerabilities for 2014 and discusses key figures and facts from a global IT security perspective.
Posted: 21 Mar 2014 | Published: 26 Feb 2014

Secunia

Early Leaders Across the Big Data Security Analytics Continuum
sponsored by IBM
WHITE PAPER: This informative white paper defines and discusses big data security analytics, including the continuum between real-time and asymmetric big data security analytics solutions.
Posted: 20 Mar 2014 | Published: 28 Jun 2013

IBM

Information Security ASEAN March 2014
sponsored by SearchSecurity.com
EZINE: This ezine looks at the security challenges facing IT security professionals in the ASEAN region with a look at threats and industry trends.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

SearchSecurity.com

Information Security ANZ March 2014
sponsored by SearchSecurity.com
EZINE: This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

SearchSecurity.com

State of Security Operations
sponsored by Hewlett-Packard Company
WHITE PAPER: With businesses recognizing the need for further investment in cyber-defense, it is essential to figure out which tools and strategies are best for your organization. Read now and find out more about the current state of security operations in 2014.
Posted: 14 Mar 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

The SIEM Evaluator's Guide
sponsored by AlienVault
WHITE PAPER: This guide takes a look at the current trends in security management and how an effective SIEM strategy can help you ensure security.
Posted: 04 Mar 2014 | Published: 04 Mar 2014

AlienVault

Securing your Midsized Business
sponsored by IBM
WHITE PAPER: This guide explores security management strategies and how to combat the growth of sophisticated threats.
Posted: 26 Feb 2014 | Published: 31 Oct 2013

IBM

SIEM Technical Guide
sponsored by SearchSecurity.com
EGUIDE: This TechGuide examines the policies and enhanced monitoring needed from a SIEM to make smarter decisions and respond faster to incidents.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

SearchSecurity.com
126 - 150 of 335 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement