IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
201 - 225 of 718 Matches Previous Page  |  Next Page
Securely Bridge Traditional and Cloud Application Environments
sponsored by A10 Networks
WEBCAST: Access this webinar to uncover how to securely manage your ADCs, deliver secure application services across multiple environments and learn how to detect and mitigate DDoS attacks against your applications and business.
Posted: 13 Feb 2017 | Premiered: Feb 13, 2017

A10 Networks

Detect Ransomware Before its's Too Late
sponsored by AlienVault
WEBCAST: View this webcast to discover how to detect malware threats quickly, saving you valuable clean-up time by limiting potential damage.
Posted: 06 Feb 2017 | Premiered: Jul 1, 2017

AlienVault

How to Secure Your Mainframes in Today's Threat Landscape
sponsored by Thycotic
WHITE PAPER: Discover modern mainframe security best practices and how to protect yours from today's threats and developments such as the loss of skilled mainframe administrators and compliance requirements and the difficulty of auditing the mainframe environment.
Posted: 27 Jan 2017 | Published: 27 Jan 2017

Thycotic

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Learn not only how developers are responding to application security trends, but also what vulnerabilities are of top concern, the risk of open-source components, insight into security during the app lifecycle, and more.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

State of Software Security: A Developer's Viewpoint
sponsored by Veracode, Inc.
WHITE PAPER: Discover app development vulnerability benchmarks and prevalence by type, as well as insights for developers to ensure the security of the apps that they are creating. Uncover solid insights into app security, such as security features being applied incorrectly, component vulnerability dangers, and more.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

Application Security Beyond SAST and DAST
sponsored by Veracode, Inc.
WHITE PAPER: Learn about trends in and the future of application security, as it stands today, and what organizations need to do to secure the most attacked and breached layer of their products: the app layer.
Posted: 16 Jan 2017 | Published: 16 Jan 2017

Veracode, Inc.

5 Lessons from an Application Security Pro
sponsored by Veracode, Inc.
WHITE PAPER: Learn 5 aspects of application security your peers highlighted as areas of particular concern or difficulty in a recent survey exploring how they are approaching application security and the obstacles they're facing in their approaches.
Posted: 16 Jan 2017 | Published: 16 Jan 2017

Veracode, Inc.

Tackle Email Fraud with Comprehensive Targeted Threat Protection
sponsored by Mimecast
WHITE PAPER: This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more.
Posted: 14 Jan 2017 | Published: 14 Jan 2017

Mimecast

Focus: Securing for the future
sponsored by ComputerWeekly.com
EGUIDE: 2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

ComputerWeekly.com

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Manage Risk by Protecting the Apps and Data that Drive Business Productivity
sponsored by Citrix
WHITE PAPER: Traditional perimeter-based security has been rendered ineffective by mobility and the cloud. In this infographic, learn how to successfully navigate the increasingly volatile IT business environment and take a new approach to information security.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Exploit Kits: Getting In by Any Means Necessary
sponsored by Palo Alto Networks
WHITE PAPER: This white paper explores the concept of exploit kits and how to defend against them. Uncover tips for reducing your attack surface, blocking known malware and exploits, identifying new threats, and more.
Posted: 19 Dec 2016 | Published: 19 Dec 2016

Palo Alto Networks

Data Breaches: Is Prevention Practical?
sponsored by Palo Alto Networks
RESEARCH CONTENT: Increased reliance on digital environments only expands the attack landscape for data breaches. Explore this survey to find out how organizations are handling data breach prevention and uncover key findings about which preventative practices are most effective for data security.
Posted: 19 Dec 2016 | Published: 30 Sep 2016

Palo Alto Networks

Best Practices for Dealing With Phishing and Ransomware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research white paper focuses on current problems in security with phishing and ransomware, and gives recommendations on how to mitigate these threats. Learn how to implement security awareness training for all users, maintain quality backups and implement detection and elimination systems for your network.
Posted: 14 Dec 2016 | Published: 30 Sep 2016

KnowBe4

Best Practices for Dealing with Phishing and Next-Generation Malware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research study focuses on the current security problems with email and other systems, and offers recommendations about how to improve security. Learn how to combat phishing and next-gen malware threats through a variety of best practices, beginning with user training.
Posted: 14 Dec 2016 | Published: 30 Apr 2015

KnowBe4

The History of Ransomware
sponsored by KnowBe4
WHITE PAPER: Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

How to Transform Employee Worst Practices Into Enterprise Best Practices
sponsored by KnowBe4
WHITE PAPER: Learn 10 best practices that contribute to an effective security awareness training program, and 4 worst practices that can detract from it. Get a clear direction on how to improve your organization's security posture and establish a human firewall to effectively block all manners of cyberattacks.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

How to Tackle Endpoint Defense Issues
sponsored by Carbon Black
EGUIDE: Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. Learn from industry experts and get up to speed on achieving the best endpoint protection.
Posted: 31 Jan 2017 | Published: 27 Jan 2017

Carbon Black

Securely Go Digital with Your Business Processes
sponsored by Cisco
RESOURCE: Discover two use cases of small business owners and the path that led them to become "secure digitizers", enabling a first-move advantage in terms of digitization for a smaller organization. Learn how to secure roaming users, implement secure guest access, scale security along with the network, and more.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Cisco

Beyond Prevention: Cisco’s Next Generation Endpoint Security
sponsored by Cisco
WHITE PAPER: Discover how a continuous approach to endpoint security plus a big data architecture can enable key areas of transformative innovation in the battle against advanced threats that target the endpoint.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Cisco

How to Speed Up Your Breach Detection Rate
sponsored by Cisco
WHITE PAPER: Learn how to reduce time to breach detection and increase detection rate. Discover how to reduce the space and time attackers have to harm your organization.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Cisco

5 Tips for Choosing a Next-GenerationEndpoint Security Solution
sponsored by Cisco
WHITE PAPER: Learn 5 tips for choosing an endpoint security solution that will protect against the modern threat landscape and prevent a breach. Learn how to detect, block, and remediate advanced malware across all endpoints.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

Cisco

APT-Style Attacks: How Cybercriminals are Using Them
sponsored by WatchGuard Technologies, Inc.
EGUIDE: New research shows cybercriminals are using more advanced attack techniques. In this e-guide, security expert Nick Lewis explains what enterprises need to know about the APT-style attacks.
Posted: 17 Jan 2017 | Published: 12 Jan 2017

WatchGuard Technologies, Inc.

Application Security Testing Vendor Evaluations
sponsored by Veracode, Inc.
ANALYST REPORT: This Gartner report evaluates vendors' maturity in offering application security testing features. Learn the strengths and weaknesses of each vendor to better assess which product is right for you.
Posted: 12 Jan 2017 | Published: 06 Aug 2015

Veracode, Inc.

Stop Ransomware Before it Starts
sponsored by Carbon Black
EBOOK: There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Carbon Black
201 - 225 of 718 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement