IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
151 - 175 of 874 Matches Previous Page  |  Next Page
What a Business Email Compromise Scam Looks Like
sponsored by Agari
PRODUCT DEMO: Gain insight into how to avoid falling prey to these email scams and protect your enterprise's data. Discover not only the intricacies of these attacks, but how to ensure every member of your team is interacting with trusted email sources.
Posted: 27 Oct 2016 | Premiered: 19 Oct 2016

Agari

Uncheck Yourself: Build a Security-First Approach to Avoid "Checkbox" Compliance
sponsored by Armor
WHITE PAPER: This white paper helps you understand compliance as simply a reporting function of a sound security posture. By devoting adequate resources to countering today's threats, you'll find that your organization can meets all or nearly all compliance requirements, simply by following sound security practices.
Posted: 26 Oct 2016 | Published: 30 Sep 2016

Armor

The Hour-By-Hour Breakdown of Threat Actors Inside Your Environment
sponsored by Armor
RESOURCE: This infographic shows you an hour by hour breakdown of a threat actor through the typical "secure" environment so you can better understand how they carry out their dastardly deeds. By knowing them better and drafting your own plan of attack, you can best prepare yourself to fight back against cyber fiends.
Posted: 26 Oct 2016 | Published: 30 Sep 2016

Armor

4 Ways to Protect and Recover from Ransomware Attacks
sponsored by Commvault
WHITE PAPER: Discover 4 best practices to protect and recover from ransomware attacks with confidence when you download this white paper.
Posted: 26 Oct 2016 | Published: 30 Sep 2016

Commvault

Increase Oracle Database Security Without Application Performance Loss
sponsored by Oracle Corporation UK Ltd
ANALYST REPORT: Learn how to implement strong security policies for Oracle Database. Uncover best practices to safeguard data while optimizing performance and increasing application availability.
Posted: 26 Oct 2016 | Published: 18 May 2016

Oracle Corporation UK Ltd

Encrypting your Data Center on Oracle's SPARC Servers
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Explore the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers.
Posted: 26 Oct 2016 | Published: 30 Sep 2016

Oracle Corporation UK Ltd

Creating a Secure Cloud Infrastructure
sponsored by Oracle Corporation UK Ltd
VIDEO: Discover how you can gain higher levels of security, efficiency and performance for your data center while making a path to the cloud. Encrypt and decrypt at full speed with zero performance impact and guard against top memory-based attacks.
Posted: 25 Oct 2016 | Premiered: 30 Sep 2016

Oracle Corporation UK Ltd

Reinvent Your Security Infrastructure Into an Information Fortress
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Discover how to reinvent your security infrastructure into an information fortress. Learn three key steps to improve the security surrounding your enterprise and learn to protect your information at the source.
Posted: 25 Oct 2016 | Published: 30 Sep 2016

Oracle Corporation UK Ltd

Endpoint Security Suite Evaluations
sponsored by Trend Micro
ANALYST REPORT: In Forrester's 25-criteria evaluation of endpoint security suite providers, analysts identified the 15 most significant vendors, then researched, analyzed, and scored them. This report shows how each provider measures up and helps security professionals make the right choice.
Posted: 25 Oct 2016 | Published: 19 Oct 2016

Trend Micro

Optimal Security for your Software-Defined Data Center
sponsored by Kaspersky Lab
PRODUCT OVERVIEW: Virtual and physical infrastructures face the same security threats - cybercriminals make no distinctions. This means you cannot afford to compromise on security for your virtual environment. Learn about a security tool designed for virtualization platform technologies that barely impacts performance.
Posted: 25 Oct 2016 | Published: 31 Aug 2016

Kaspersky Lab

Defend Your Apps and Websites From Multi-Vector DDoS Attacks
sponsored by A10 Networks
VIDEO: Discover an alternative to current, ineffective DDoS protection solutions in this short video. Learn about multi-vector protection and always-on application availability that is also scalable, efficient, and affordable.
Posted: 25 Oct 2016 | Premiered: 08 Jan 2016

A10 Networks

Game Over: 3 Scenarios Where Compliance Isn't Enough
sponsored by Armor
WHITE PAPER: Discover 3 real-world "game over" scenarios to show you why simply being compliant isn't enough. Learn why compliance is just a basic first step, highlighting the need for real, proactive and ongoing security controls.
Posted: 25 Oct 2016 | Published: 30 Sep 2016

Armor

An MSP's Guide to selling IT Security
sponsored by LogicNow
WHITE PAPER: By enhancing your security capabilities, you can add additional value to your offerings. Learn how to evolve into a Managed Security Service Provider (MSSP) and enable various security strategies that complement each other.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

LogicNow

Security & Compliance Are No Gamble
sponsored by Armor
CASE STUDY: Discover how the gaming industry was able to create a more efficient, streamlined flow of processes and get military-grade security for sensitive information. Learn how your organization can reach the same level of compliance and security while allowing authorized parties to access data easily.
Posted: 25 Oct 2016 | Published: 30 Sep 2016

Armor

Information Security Policy Reference Guide
sponsored by Navex Global
WHITE PAPER: This guide can help any organization struggling with data protection policies put solid guidelines in place for employees to follow. Uncover a definite structure for information security, access control and compliance among many other critical areas.
Posted: 25 Oct 2016 | Published: 30 Sep 2016

Navex Global

Securing and Monitoring Access to Office 365
sponsored by Imperva
WHITE PAPER: Discover how to best secure and monitor your Office 365 users to fully realize its benefits. Learn why Office 365 is quickly becoming a target for many hackers as well as the challenges involved with securing it.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

Imperva

DDoS: A Clear and Present Danger
sponsored by A10 Networks
WHITE PAPER: Discover eye-opening statistics detailing DDoS attacks and which industries are most in danger. Learn how to protect against an attack and the protection steps that make the most sense for your organization.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

A10 Networks

Guide to PCI Compliance in the Cloud
sponsored by Armor
WHITE PAPER: Discover how to achieve complete control of your IT environment when you pursue PCI DSS compliance on your DIY cloud security environment. Learn the basics of compensating controls, gain an understanding of the latest version of PCI DSS, and more.
Posted: 24 Oct 2016 | Published: 24 Oct 2016

Armor

Block Threats with Multiple Cybersecurity Layers
sponsored by Armor
WHITE PAPER: Discover how to keep your sensitive data safe and your business up and running without interruptions. Ensure your organization, customers and sensitive data are protected by leveraging a defense-in-depth strategy that is designed with integrated security from the ground up.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

Armor

Tolly Report: IBM Security Network Protection XGS 7100 Evaluation
sponsored by IBM
RESOURCE: This report shows you the test results found by Tolly of IBM Security Network Protection XGS 7100 appliance. Learn how this next-generation intrusion prevention appliance faired in attack detection, blocking of various threat corpora, multi-protocol throughput and other tests.
Posted: 24 Oct 2016 | Published: 01 Feb 2016

IBM

NSS Labs Data Center IPS Test Report: IBM XGS 7100
sponsored by IBM
PRODUCT OVERVIEW: This report represents the independent test results of IBM Security Network Protection XGS 7100 v5.3.2.1 conducted by NSS Labs. Learn how IBM's Data Center Intrusion Prevention System (DCIPS) faired against NSS Labs' tests and how it stacks up against other DCIPS products.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

IBM

Balancing Endpoint Security vs. End User Productivity
sponsored by AppSense
TRANSCRIPT: Most IT organizations struggle to balance endpoint security and user productivity. Industry expert Simon Townsend examines both sides of the issue and suggests approaches that will help you get and maintain that balance.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

AppSense

Balancing Endpoint Security vs. End User Productivity
sponsored by AppSense
PODCAST: Most IT organizations struggle to balance endpoint security and user productivity. In this podcast, industry expert Simon Townsend will examine both sides of the issue and suggest approaches that will help you get and maintain that balance.
Posted: 21 Oct 2016 | Premiered: Oct 13, 2016

AppSense

Balancing Endpoint Security vs. End User Productivity
sponsored by AppSense
WEBCAST: Most IT organizations struggle to balance endpoint security and user productivity. In this webcast, industry expert Simon Townsend will examine both sides of the issue and suggest approaches that will help you get and maintain that balance.
Posted: 21 Oct 2016 | Premiered: Oct 13, 2016

AppSense

The Evolution of Locky Ransomware's Javascript Downloaders
sponsored by Booz Allen Hamilton
RESOURCE: Learn the history of the Locky ransomware virus and how to spot it. Discover how it was created and what you can do to keep it from infecting your systems.
Posted: 26 Oct 2016 | Published: 30 Sep 2016

151 - 175 of 874 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement