IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
151 - 175 of 446 Matches Previous Page  |  Next Page
Advances and Benefits of SIEM Products
sponsored by LogRhythm, Inc.
EGUIDE: In this expert e-guide, learn the latest SIEM system advances to help mitigate malicious attacks as well as 3 additional benefits enterprises can enjoy from implementing an SIEM strategy.
Posted: 18 Dec 2015 | Published: 09 Dec 2015

LogRhythm, Inc.

Resolve to Revitalize Your SIEM Security
sponsored by SearchSecurity.com
EBOOK: This expert guide explores some of the latest developments in SIEM technology and how you can best take advantage of them.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

SearchSecurity.com

Protect your Network with Effective Incident Response
sponsored by Blue Coat Systems
VIDEO: For a holistic view of security, organizations need effective incident response. Watch this videocast to find a demo on comprehensive network forensics.
Posted: 08 Dec 2015 | Premiered: 08 Dec 2015

Blue Coat Systems

Analytics Stop Advanced Threats in their Tracks
sponsored by Blue Coat Systems
WHITE PAPER: In this solution brief, you'll find relief knowing that breaches can be treated with a comprehensive approach that provides the intelligence and real-time analysis needed to see, understand, respond to and fortify the network against advanced threats.
Posted: 04 Dec 2015 | Published: 31 Dec 2014

Blue Coat Systems

Executive Summary: Proactive Response to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: This white paper describes how to find a solution that addresses two main drivers of incident response (IR) costs. Discover key strategies for lowering costs and maximizing ROI when performing IR, with details on three maturity models.
Posted: 03 Dec 2015 | Published: 30 Sep 2015

Blue Coat Systems

Swiss Army Knife Security? How to Vet Integrated Tool Sets
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at the changing delivery models for cybersecurity tools as more vendors offer multi-tool platforms and services. Let us help you make sense of it all with advice on tool consolidation.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

SearchSecurity.com

Protect Against Email-Borne Threats
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, learn how advanced threat protection can uncover and prioritize sophisticated attacks entering your organization through email. Discover how you can leverage targeted attack identification, detailed malware reporting, data correlation, a consolidated view of attacks across endpoints, networks, and email, and more.
Posted: 02 Dec 2015 | Published: 31 Oct 2015

Symantec Corporation

Top 10 SIEM Implementer’s Checklist
sponsored by AccelOps Inc.
WHITE PAPER: This informative white paper outlines 10 best practices for successful SIEM implementation.
Posted: 01 Dec 2015 | Published: 19 Dec 2012

AccelOps Inc.

Security Information and Event Management FAQs
sponsored by AccelOps Inc.
WHITE PAPER: In this white paper, review the top SIEM strategy evaluation FAQs to better understand what products offer what services and help your organization choose the right approach. View now to learn how one SIEM strategy differs from the others and what to expect from the offerings on the market.
Posted: 20 Nov 2015 | Published: 30 Nov 2011

AccelOps Inc.

Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this magic quadrant to learn how vendors are updating SIEM technologies for growing threat prevention needs, and how they can help you.
Posted: 12 Nov 2015 | Published: 20 Jul 2015

LogRhythm, Inc.

Critical Capabilities for Security Information and Event Management (SIEM)
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this report for insight on aligning IT's needs with three key use cases to choose the best SIEM solution for the organization.
Posted: 12 Nov 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

Critical Capabilities Use Cases for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This vendor comparison reviews SIEM performance by three different use cases, showing you which SIEM platform works best for your business needs.
Posted: 27 Oct 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

Gartner Critical Capabilities for SIEM
sponsored by Intel Security
WHITE PAPER: As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Posted: 23 Oct 2015 | Published: 25 Jun 2014

Intel Security

Intel Security Positioned in Leaders Quadrant of the Magic Quadrant for SIEM
sponsored by Intel Security
WHITE PAPER: Read this report to learn how Gartner's Magic Quadrant for SIEM can help you evaluate the market, technology, and service providers, and why McAfee Enterprise Security Manager (ESM) is positioned in the SIEM Leaders Quadrant.
Posted: 23 Oct 2015 | Published: 20 Jul 2015

Intel Security

Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This in-depth resource tells you all you need to know about big data security and how it can catch advanced, targeted attacks.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

Blue Coat Systems

Turning the Tables on Cyber Criminals - Kill Chain eBook
sponsored by Proofpoint, Inc.
WHITE PAPER: Delve into the minds of hackers and learn how they plan, launch, and monitor attacks against security systems. Learn the 7 steps of the kill chain and how to use each phase to take the advantage over cybercriminals and stop them in their steps.
Posted: 22 Oct 2015 | Published: 13 Jul 2015

Proofpoint, Inc.

SIEMplifying Security Monitoring for SMBs
sponsored by AlienVault
WHITE PAPER: This white paper discusses the unique SIEM challenges SMBs face. Access this resource now to learn how you can get the most out of your SIEM despite limited resources.
Posted: 22 Oct 2015 | Published: 22 Oct 2015

AlienVault

When Minutes Count:How to Fight Advanced Threats with Real-Time SIEM
sponsored by Intel Security
WHITE PAPER: This report assesses organizations' abilities to detect and deflect targeted attacks, reveals the top eight most critical indicators of attack, and examines best practices for proactive incident response, including use of real-time SIEM solutions.
Posted: 22 Oct 2015 | Published: 31 Dec 2014

Intel Security

Research Report: Attack Detection and Incident Response
sponsored by Intel Security
WHITE PAPER: This report examines organizations' security strategies, cyber-attack environments, and IR challenges and needs, including a lack of visibility into user and network activity, shortage of investigative skills, and poor security analytics capabilities.
Posted: 20 Oct 2015 | Published: 30 Apr 2015

Intel Security

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

Detecting Hidden Network Attacks Before a Breach
sponsored by Prelert
WHITE PAPER: This white paper explores a proactive approach to mitigating modern day cyber security threats and detecting attacks as they enter the network.
Posted: 07 Aug 2015 | Published: 15 Jul 2015

Prelert

10 SIEM Platforms Tested for Security Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This report looks at ten different SIEM products and analyzes which one performs best when it comes to security event management.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

LogRhythm, Inc.

Special Report: 10 SIEM Technologies Reviewed
sponsored by LogRhythm, Inc.
WHITE PAPER: This report analyzes ten different SIEM technologies for risk management, threat detection, and performance.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

LogRhythm, Inc.

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

SearchSecurity.com

Strengths and Weaknesses of 13 SIEM Solutions
sponsored by AlienVault
WHITE PAPER: This Gartner report provides detailed reviews of the strengths and weaknesses of 13 different SIEM solutions.
Posted: 30 Jul 2015 | Published: 20 Jul 2015

AlienVault
151 - 175 of 446 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement