IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
151 - 175 of 795 Matches Previous Page  |  Next Page
Euronext Euronext’s recent IPO was a catalyst to create a coherent security environment across the new business.
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: The point of security isn't just safeguarding data, mitigating loss, and providing ROI. Ultimately it's about providing peace of mind. Discover how Euronext was able to go beyond standard virus and scanning capability, reduce threat risk across their technology estate, improve threat visibility, mitigation and resolution action , and more.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Symantec & Blue Coat Systems

Keeping Your Private Data Secure
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover how to protect your organization with various types of encryption, allowing your data to possibly stay safe even in the event of a breach.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Symantec & Blue Coat Systems

Securing Your Amazon Web Services Environment
sponsored by Armor
WHITE PAPER: Learn how to make better-informed decisions about the security control options for AWS usage so you can choose the best combination of controls for your organization's situation and needs.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Armor

2017 Report: Capabilities and Maturity of Cyber Defense Organizations
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this comprehensive report learn the minutiae of the current threat landscape, discover how there has never been a stronger connection between security initiatives and business goals, and what trends are driving the evolution of security.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Hewlett Packard Enterprise

Ensure your Move to Azure is Secure
sponsored by Armor
WHITE PAPER: Learn how to ensure that your organization's data, applications, and operating systems are securely deployed, monitored and maintained in Azure's IaaS environment.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Armor

Is Onboard Key Storage the Right Corporate Strategy?
sponsored by Gemalto
WHITE PAPER: Learn the answer to the question: "Is onboard key storage a 'good enough' solution, or is an external key management system something that should be deployed?"
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Gemalto

Symantec Data Loss Prevention Solution
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Sensitive information is leaving the safety of your corporate network and flying into the cloud where traditional security approaches hold little sway. Learn how to manage and protect your information in the modern, cloud-driven environment.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

Symantec & Blue Coat Systems

Six Steps to a Better Security Strategy
sponsored by Armor
WHITE PAPER: In this Forrester report, discover 6 straightforward steps you can take immediately to start building a truly business-savvy security strategy.
Posted: 08 Mar 2017 | Published: 22 Jan 2016

Armor

Cost Savings, Risks, and Benefits: Armor Complete And Armor Anywhere
sponsored by Armor
WHITE PAPER: In this Forrester report, discover the security benefits, cost savings, associated risks and ROI of the Armor Complete and Armor Anywhere cloud data protection tools. Gain insight into what makes it and what doesn't in the face of today's threat landscape.
Posted: 08 Mar 2017 | Published: 31 Jan 2017

Armor

6 Steps to Proactive Cybersecurity Protection
sponsored by BAE Systems
WHITE PAPER: Learn how to take a stratified approach to IT security that leverages threat intelligence to prevent breaches. Discover 6 steps to proactive cybersecurity protection and obtain the monitoring capabilities you're looking for.
Posted: 07 Mar 2017 | Published: 31 Dec 2016

BAE Systems

What Does Real-Time Threat Intelligence Enable?
sponsored by Recorded Future
WEBCAST: Discover how real-time threat intelligence empowers organizations to develop a proactive cyber security posture and helps to answer questions like, "When will I, or have I been, attacked?" and "How did the adversary breach the organization?"
Posted: 06 Mar 2017 | Premiered: Mar 6, 2017

Recorded Future

Why Threat Intelligence Matters to your Organization
sponsored by Recorded Future
WEBCAST: Gain an expert's viewpoint on what threat intelligence is, how it works and why it matters. Uncover how you can keep your information security teams stay ahead of cyberattacks.
Posted: 06 Mar 2017 | Premiered: Mar 6, 2017

Recorded Future

Recorded Future for Splunk Enterprise Security (ES)
sponsored by Recorded Future
WEBCAST: Explore how to use real-time threat intelligence to dramatically increase your organization's speed to avoid false positives and rapidly understand true incidents in context.
Posted: 06 Mar 2017 | Premiered: Nov 18, 2016

Recorded Future

Advanced Detection of Existing, New and Evolving Cybersecurity Threats
sponsored by BAE Systems
WHITE PAPER: According to security experts, SIEM is currently catching less than 1% of successful advanced threats. Learn how to go beyond SIEM and discover how to incorporate a data platform with advanced threat analytics, big data capabilities, and an investigation console into your cybersecurity strategy.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

BAE Systems

Managing Cybersecurity Risk: How Directors and Corporate Officers Can Protect Their Businesses
sponsored by BAE Systems
WHITE PAPER: Go beyond simple risk management by implementing cybersecurity practices designed not only to prevent breaches but anticipate the damage and recover from attacks. Discover how to bolster endpoint security and data loss prevention by identifying potential attackers to improve your organization's threat awareness and put the right tools in place.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

BAE Systems

Identifying TTPs with threat intelligence With Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: Learn the finer points of knowing how to counter the tactics, techniques, and procedures (TTPs) of a malicious attacker. Uncover the value of identifying attacker TTPs and understanding information source types to ultimately improve relevant and timely intelligence reporting.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Recorded Future

Exploring the Threat Intelligence Process
sponsored by Recorded Future
WHITE PAPER: This video demonstrates how you can use real-time threat intelligence to sort through data quickly so that you can focus on what matters: threat analysis and detection. Uncover the 3 core steps that go into the threat intelligence process.
Posted: 02 Mar 2017 | Published: 27 Oct 2016

Recorded Future

Threat Intelligence Reveals Secrets: From the Surface to the Dark Web
sponsored by Recorded Future
WHITE PAPER: Learn how the deep web, and by extension the dark web, are closer to the surface web that you most likely enjoy every day. Discover what we can learn from the connections between the three and what it means for your organization's security policy.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Recorded Future

Turning Threat Data Into Threat Intelligence
sponsored by Recorded Future
VIDEO: Explore how you can consolidate massive amounts of real-time data from a wide range of sources in a concise view of available threat intelligence. See how you can view threat-related entities at once, such as hashes, domains, threat actors, and more.
Posted: 02 Mar 2017 | Premiered: 07 Feb 2017

Recorded Future

Intelligent Security Operations: A How-To Guide
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Find your roadmap for implementing an intelligent, analytics-driven security operations center in this white paper. Discover how to gain visibility into your organization to detect and respond to existing and new threats.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Hewlett-Packard Enterprise

Inside Look at Cyberattack Trends and Statistics
sponsored by Recorded Future
WHITE PAPER: Discover eye-opening cyberattack trends and statistics in this white paper. Learn more about the methods of cybercriminals happing in the dark web and how you can reduce risk of an attack using threat intelligence strategies.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Recorded Future

Comparing SIEM, Big Data, and Behavior Analytics
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Learn how SIEM can effectively secure your organization's logs where big data can fail. Discover the components of effective and mature SIEM, SIEM's correlation with security context, scaling security detection, and more.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

Hewlett-Packard Enterprise

7 Essential Components of a Threat Intelligence Program
sponsored by Recorded Future
WHITE PAPER: The goal of threat intelligence is to reduce operational risk. Uncover critical concepts and practical details, where necessary, to produce a world-class threat intelligence capability from scratch.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

Recorded Future

Anti-Money Laundering: Combatting Rising Threats and Meeting Regulations
sponsored by BAE Systems
RESEARCH CONTENT: With the cost of non-compliance continuing to rise, learn how banking and financial institutions are bolstering their anti-money laundering (AML) systems. Plus, discover how to derive further value from AML platforms by leveraging their ability to provide a multi-sourced, dynamic, and up-to-date view of customer account data to create key insights.
Posted: 01 Mar 2017 | Published: 29 Feb 2016

BAE Systems

Learn How This Insurance Agency Was Able to Increase Their Fraud detection Abilities
sponsored by BAE Systems
CASE STUDY: Learn how a global tier one insurer was able to increase their fraud protection capabilities with the adoption of a unified security system in this case study. Discover how they increased operational efficiency despite business-wide cost-cutting and more inside.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

BAE Systems
151 - 175 of 795 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement