IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
176 - 200 of 734 Matches Previous Page  |  Next Page
Make EMM Part of a Broader Mobile Enterprise Strategy
sponsored by Microsoft
EGUIDE: If management is the centerpiece of your mobile enterprise strategy, you're doing it wrong. Learn how adding MAM and MCM capabilities to your EMM strategy can help you enforce mobile security policies, but also enable your workers to be more productive, transforming how your business operates.
Posted: 10 Jun 2016 | Published: 03 Jun 2016

Microsoft

Masergy Unified Enterprise Security Demo
sponsored by MASERGY
WEBCAST: Access this webcast to discover how machine learning combined with continuous human monitoring can harden your defenses and improve your advanced threat detection capabilities.
Posted: 09 Jun 2016 | Premiered: May 1, 2016

MASERGY

B2B Success Story: E-Commerce Strategy for Thousands of Daily Transactions
sponsored by Axway
WEBCAST: In this video, Shawn Buske discusses the e-commerce system that Jabil chose to handle thousands of daily B2B transactions. Jabil was also able to easily meet SLA compliance and security compliance requirements.
Posted: 08 Jun 2016 | Premiered: Jan 11, 2016

Axway

Security Solutions for Mobile Users in the Workplace
sponsored by HID
EBOOK: This e-book describes the security landscape for mobile devices and how you can improve the user experience on mobile devices while still protecting your assets and managing costs efficiently.
Posted: 07 Jun 2016 | Published: 31 Dec 2015

HID

Reporting Cybersecurity to the Board
sponsored by BitSight
WHITE PAPER: Today, boards have to consider the regulatory, fiduciary, organizational, and personal liability that could come from a data breach. Download this free guide today, and you'll have everything you need for your next board presentation to hit all the right points.
Posted: 07 Jun 2016 | Published: 01 May 2016

BitSight

Revealing Security Performance Metrics Across Major World Economies
sponsored by BitSight
WHITE PAPER: In its latest research report, BitSight studied the security performance of companies per country with more than 50% of their IP space in: The United States, United Kingdom, Germany, Brazil, China and Singapore.
Posted: 07 Jun 2016 | Published: 01 May 2016

BitSight

Masergy Customer turned Evangelist, Stuart Carrothers talks Masergy
sponsored by MASERGY
WEBCAST: In this video, you'll discover a security vendor that wants to work with you for the lifetime of your organizations. From them, you'll get real-time visibility and change bandwidth as you need it. Learn about largest global network in the world based on software defined networking.
Posted: 07 Jun 2016 | Premiered: May 1, 2016

MASERGY

Understand the Business Impact and Cost of a Breach
sponsored by MASERGY
ANALYST REPORT: This Forrester Report will help security and risk leaders build a case for investment to show business leaders what kind of investment it'll take to adequately protect their organization.
Posted: 07 Jun 2016 | Published: 12 Jan 2015

MASERGY

S.I.R.M.: Security Incident Response Matrix
sponsored by Anomali
WHITE PAPER: This paper details the Security Incident Response Matrix (S.I.R.M.), a simple, easy to understand methodology used to help guide security operations staff in effectively triaging alerts and activity. The goal of this triage is to derive the intelligence necessary to understand the scope and threat of the activity.
Posted: 06 Jun 2016 | Published: 31 Dec 2015

Anomali

Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale
sponsored by Anomali
WHITE PAPER: To address growing scalability issues, organizations will need to embrace a distributed computing approach to security. In addition, Threat Intelligence Platforms will need to create organizational relevance for threat intelligence data.
Posted: 06 Jun 2016 | Published: 31 Dec 2015

Anomali

Next Generation Cybersecurity: The Age of Artificial Intelligence
sponsored by MASERGY
WEBCAST: Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.
Posted: 06 Jun 2016 | Premiered: May 1, 2016

MASERGY

Masergy UES Offers Unique Approach to Network Defense
sponsored by MASERGY
ANALYST REPORT: Instead of applying a one-size-fits-all approach, multi-stage machine learning analysis detects events differently on different networks. Learn how this security strategy can find predictable patterns on your network and methods that work best for it.
Posted: 06 Jun 2016 | Published: 11 Nov 2015

MASERGY

Professionalizing the Cloud Security Workforce
sponsored by (ISC)2 UK Ltd
WEBCAST: Join Jim Reavis, CEO of Cloud Security Alliance and David Shearer, CEO of (ISC)² to learn more about the CCSP, the qualifications for it and the future of cloud security.
Posted: 06 Jun 2016 | Premiered: Aug 20, 2015

(ISC)2 UK Ltd

Why Today's Phishing Attacks are Harder to Detect
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to best protect your email gateway from phishing attacks and keep important information from being shared or exposed. Get clear visibility into all email using search and reporting capabilities to prioritize security incidents.
Posted: 06 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

Encrypt Office 365 Emails
sponsored by ZixCorp
RESOURCE: Passive identification of what emails should be encrypted can simultaneously protect your business while unburdening your system from unnecessary processes. Discover how to automatically scan outbound emails from Office 365 connectors and accurately detect sensitive information and evolve with changing best practices.
Posted: 03 Jun 2016 | Published: 01 May 2016

ZixCorp

Make Behavioral Analytics Part of Your Security Strategy
sponsored by MASERGY
RESOURCE: Discover how behavioral analysis work and learn how it can benefit your network security. Shift your focus from blocking and preventing breaches to detecting and rapidly responding to attacks.
Posted: 03 Jun 2016 | Published: 05 Aug 2015

MASERGY

Protect Confidential Data While Keeping Mobile Users Productive
sponsored by IBM MaaS360
WHITE PAPER: Common sense dictates that you look for ways to supplement your mobile device management (MDM) solution with additional, more robust security controls. This white paper helps you identify the goals for your MDM security strategy and select the best approach to reach those goals.
Posted: 03 Jun 2016 | Published: 01 Mar 2016

IBM MaaS360

Bank Invests in Centralized Security Visibility to Promote Business Intelligence
sponsored by Splunk
CASE STUDY: Read this case study to determine how Orrstown Bank leveraged a cloud security platform to provide increased visibility into its complex hybrid IT infrastructure, resolve threats and maintain required compliance.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Splunk

Build a common identity profile and hub out of disparate identity sources
sponsored by Radiant Logic, Inc.
WHITE PAPER: Discover how to renew your existing IAM investments, making them a strategic infrastructure solution that supports current identity needs and adapts quickly to future requirements as they arise.
Posted: 02 Jun 2016 | Published: 01 May 2016

Radiant Logic, Inc.

User Behavior Analytics: Track Individual Data and Activities in Your Network
sponsored by Exabeam
EGUIDE: Insider threats are a top vulnerability for many organizations. In this e-guide, you'll learn about the threat posed by individual network users, and how to leverage user behavior analytics to track and expose them.
Posted: 01 Jun 2016 | Published: 24 May 2016

Exabeam

The Rise of the Cloud Security Professional
sponsored by (ISC)2 UK Ltd
WHITE PAPER: The problem with implementing a secure cloud strategy comes in the lack of understanding around how to define cloud computing and its risks. By employing credentialed cloud security professionals, you can ensure your organizations is using the today's best practices that can maintain secure cloud computing infrastructures.
Posted: 01 Jun 2016 | Published: 31 Dec 2015

(ISC)2 UK Ltd

Get Help Tracking Down the Leak
sponsored by Exabeam
WHITE PAPER: Learn how to best utilize UBA and threat hunting in your security intelligence platform to proactively catch unwanted activity across your network.
Posted: 31 May 2016 | Published: 01 Apr 2016

Exabeam

The Road to SDN is Paved with Visibility and Many Good Intentions
sponsored by Gigamon
WHITE PAPER: Understanding traffic pathways and baselines before during and after the SDN migration means knowing how well the transition is delivering on CAPEX and OPEX promises as well as potential for higher security. Eliminate security blind spots with this Security Deliver Platform.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

Addressing the Threat Within: Rethinking Network Security Deployment
sponsored by Gigamon
WHITE PAPER: A structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. Discover how the Security Delivery Platform is becoming a building block to deploying security solutions.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

The State of Incident Response
sponsored by ServiceNow
RESEARCH CONTENT: Take a close-up look at the current practices and challenges associated with incident response processes and technologies. Browse through tips from IT leaders to guide your security framework.
Posted: 13 Jun 2016 | Published: 29 Feb 2016

ServiceNow
176 - 200 of 734 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement