IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event ManagementReports
176 - 200 of 281 Matches Previous Page  | Next Page
Effective Ways to Search Log Files
sponsored by SearchSecurity.com
EGUIDE: Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

SearchSecurity.com

E-Guide: Securing the SIEM system: Control access, prioritize availability
sponsored by SearchSecurity.com
EGUIDE: Given the vital role a security information and event management (SIEM) system plays in an organization’s security infrastructure, a compromised or crashed system can mean devastating consequences. This e-guide explores the serious implications of a corrupted SIEM system and offers helpful tips on how to secure them.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

SearchSecurity.com

Technical Guide on SIM: Moving beyond network security toward protecting applications
sponsored by SearchSecurity.com
EGUIDE: SIMs have been widely adopted for their value in correlating, reporting and alerting on network security. But SIMs can be used for more than just network security monitoring. The same tools can also bring value to application managers if used correctly. In this technical guide, gain 4 steps for integrating applications into enterprise SIMs.
Posted: 01 Jan 2012 | Published: 20 Dec 2011

SearchSecurity.com

Log management best practices
sponsored by SearchSecurity.com
EGUIDE: Investing in the correct log management tool can ensure that the pressures of maintaining enterprise system log data are greatly decreased. Although the right tool is very helpful, the possibility of it turning into the wrong tool can happen in the blink of an eye if the correct steps are not taken.
Posted: 29 Nov 2011 | Published: 29 Nov 2011

SearchSecurity.com

Vendor Landscape: Security Information & Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This informative resource demonstrates how organizations can find a SIEM solution and achieve key goals. Other topics explained in this white paper include; understanding the capabilities of SIEM technologies and potential use cases.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

LogRhythm, Inc.

Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this white paper for a comprehensive comparison of the leading security information and event management (SIEM) providers. Read on for an overview of the SIEM market and the vendor landscape to help you evaluate your options.
Posted: 19 Jul 2012 | Published: 19 Jul 2012

LogRhythm, Inc.

Four Things You Should Know About Securing Your Growing Business
sponsored by Symantec Corporation
WHITE PAPER: SMBs may not have the same resources as their enterprise counterparts, but they face the same threats. In the resource, uncover 4 things you should know about securing your growing business and how to protect all points of your organizations more efficiently, without straining your resources.
Posted: 06 Jul 2012 | Published: 06 Jul 2012

Symantec Corporation

The Security for Business Innovation Council (SBIC) report, 'Getting Ahead of Advanced Threats'
sponsored by EMC Corporation
WHITE PAPER: In an era of advanced threats, having greater situational awareness is vital for detecting and mitigating attacks. Unfortunately, most organizations lack the capability for intelligence gathering and analysis. In this comprehensive report, gain guidance from top security leaders on how to get ahead with intelligence-driven information security.
Posted: 22 May 2012 | Published: 21 May 2012

EMC Corporation

University of the Sunshine Coast Improves Security with Sentinel
sponsored by NetIQ
CASE STUDY: Access this case study to uncover how Sentinel helped one educational institution cost-effectively meet audit requirements for monitoring access to core finance systems, provide simpler access to network resources for users while improving security.
Posted: 18 May 2012 | Published: 17 May 2012

NetIQ

Establishing a Formal Cyber Intelligence Capability
sponsored by Verisign, Inc.
WHITE PAPER: While the benefits of advanced intelligence are substantial, achieving the capability requires a careful planning and consideration. In this paper, uncover best practices and a proven process for establishing a formal cyber intelligence capability as well as explore key considerations.
Posted: 03 May 2012 | Published: 03 May 2012

Verisign, Inc.

Palo Alto Networks in the Data Center: Eliminating Compromise
sponsored by Palo Alto Networks
WHITE PAPER: This resource explores best practices for data center network security. Learn how to protect your business without compromising flexibility and application availability.
Posted: 20 Apr 2012 | Published: 20 Apr 2012

Palo Alto Networks

The changing SIEM landscape: What you should know to stay ahead
sponsored by SearchSecurity.com
EGUIDE: While SIEM systems are often expensive and complex, they play a vital part in your risk and compliance strategy. This technical guide on SIM explores SIEM technologies today and offers exclusive tips and considerations for your deployment.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

SearchSecurity.com

Worldwide and U.S. Security Services Threat Intelligence 2011–2014 Forecast: Out of the Basement and into the Clouds
sponsored by Vigilant
ANALYST REPORT: With threats becoming more advanced, organizations need new innovative ways to defend against them. View this excerpt from IDC Market Analysis to explore security services threat intelligence market including its current state, how the technology works, key benefits and competitive overview.
Posted: 02 Apr 2012 | Published: 02 Apr 2012

Vigilant

Funnel vs. Framework: Rapid Value from SIEM through a Program- Driven Approach
sponsored by Vigilant
WHITE PAPER: Why are some organizations successful with SIEM and others faulter? The shortcomings of SIEM projects are usually not the fault of technology, but in the processes that were deployed. This paper explores the pitfalls of implementing SIEM through a technology-centric “funnel” approach and the value SIEM can bring though a program-driven approach.
Posted: 01 Apr 2012 | Published: 30 Mar 2012

Vigilant

Presentation Transcript: Balancing compliance with security
sponsored by HP Enterprise Security
PRESENTATION TRANSCRIPT: This presentation transcript explores exactly what it means to be secure and compliant, as well as how security information management (SIM) can assist organizations in achieving both.
Posted: 30 Mar 2012 | Published: 20 Mar 2012

HP Enterprise Security

Improving regulatory compliance management through log analysis, SIM
sponsored by HP Enterprise Security
EGUIDE: This E-Guide highlights the importance of log analysis and security information and event management (SIEM) in improving regulatory compliance management.
Posted: 30 Mar 2012 | Published: 30 Mar 2012

HP Enterprise Security

Security Information and Event Management: Unique McAfee data management technology
sponsored by McAfee, Inc.
WHITE PAPER: This paper explores and refutes the common myths of data management in SIEM/logging, the key challenges and requirements for an effective solution, and how the uniqueness of McAfee EDB satisfies these requirements.
Posted: 23 Mar 2012 | Published: 23 Mar 2012

McAfee, Inc.

NetIQ Sentinel 7 Review - Real-time SEIM and Log Manangement for Today
sponsored by NetIQ
WHITE PAPER: This paper offers a functional review of the latest NetIQ offering in security information and event management (SIEM) that effectively address log management issues. View now to explore how NetIQ performs in event correlation alerting, security intelligence and trend analysis and more.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

NetIQ

LogRhythm and NERC
sponsored by LogRhythm, Inc.
WHITE PAPER: The NERC CIP Cyber Security Standards is intended to ensure the protection of the Critical Cyber Assets that control or effect the reliability of North America’s bulk electric systems. View this paper to explore how LogRhythm's NERC CIP Compliance package provides out-of-the box assistance in addressing numerous NERC CIP requirements.
Posted: 27 Feb 2012 | Published: 24 Feb 2012

LogRhythm, Inc.

Continuous Monitoring: Responding to New Threats in More Complex IT Environments
sponsored by Tripwire, Inc.
WHITE PAPER: Governments today are focusing on the practice of continuous monitoring as a means to providing the much needed balance between data access and protection. In this paper, learn more about continuous monitoring, including what is it and why it’s needed, guidelines for implementing it, key capabilities of an effective solution, and more.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Tripwire, Inc.

Tripwire IT Security & Compliance Automation Solutions –Empowering IT Security in an Insecure World
sponsored by Tripwire, Inc.
WHITE PAPER: In this solution brief, discover how Tripwire IT security and compliance automation solutions provides the visibility, intelligence and automation of IT security controls needed to gain confidence in the protection of your data.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Tripwire, Inc.

Predictive Security Intelligence for Retail Organizations
sponsored by Q1 Labs, an IBM Company
WEBCAST: This webcast explores how to add a new dimension to security intelligence through risk management. Extend the value of SIEM and Log Management to determine risk levels throughout your network by integrating vulnerability assessment scan results, network behavior analysis and topology, device configurations, policies, and compliance management.
Posted: 24 Feb 2012 | Premiered: Feb 24, 2012

Q1 Labs, an IBM Company

IT Decision Checklist: Security Information and Event Management
sponsored by HP Enterprise Security
EZINE: As the complexity of the networks IT manages continues to increase, so too does the volume of security-related information generated by network devices. This exclusive e-zine explores the business and technical considerations in selecting the security information management (SIM) tools you need to maintain control.
Posted: 24 Feb 2012 | Published: 23 Feb 2012

HP Enterprise Security

Zero Trust Model: Securing the Extended Enterprise
sponsored by Sophos, Inc.
EGUIDE: The emergence of new connection options and devices being introduced to the enterprise are extending networks well beyond their controllable boarders. This expert resource offers insight into securing the extended enterprise, exploring the strategy behind Zero Trust Model, creating network security policies for hostile endpoints and more.
Posted: 02 Feb 2012 | Published: 02 Feb 2012

Sophos, Inc.

Find the Needle in the Haystack – Audit and Compliance Reporting for AIX
sponsored by Safestone Technologies
WHITE PAPER: This white paper discusses how organizations can address the challenge of meeting audit and compliance regulations, whilst driving down costs and reducing risk. It outlines how Safestone’s Compliance Center for AIX solution efficiently collects raw data and refines it into easy-to-understand, actionable information.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

Safestone Technologies
176 - 200 of 281 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement