Security Event Management Reports

The Evolution of Threat Detection and Management
sponsored by TechTarget Security
EGUIDE: This e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.
Posted: 19 Jun 2013 | Published: 19 Jun 2013

TechTarget Security

SIEM Best Practices for Advanced Attack Detection
sponsored by TechTarget Security
EGUIDE: The industry has panned SIEM as an expensive and under performing technology. But to be clear, it's not a technology problem, it's a process issue. In this tech tip, Securosis analyst Mike Rothman will outline a time tested process to build SIEM policies which actually alert on the attacks you need to protect against.
Posted: 17 May 2013 | Published: 17 May 2013

TechTarget Security

Unlocking the Opportunity of SIEM Technology
sponsored by TechTarget Security
EGUIDE: Explore how a security information and event management (SIEM) system works, what types of data you can integrate into it, the process for detecting threats/incidents, and steps you should take to develop a successful SIEM capabilities.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security

The Improvement and Evolution of SIEM
sponsored by TechTarget Security
EGUIDE: Get an in-depth look at the past, present and future of security information and event management (SIEM) technology in this informative E-Guide from SearchSecurity.com.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security

The Future of Next-Generation SIEM
sponsored by TechTarget Security
EGUIDE: This expert E-Guide explores what it means to be an "ideal" security information and event management (SIEM) system and takes a look into a crystal ball to explore five futures SIEMs must conquer to be considered next-gen systems. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

TechTarget Security

Security Information Management Systems and Application Monitoring
sponsored by TechTarget Security
EGUIDE: Did you know your security information management (SIM) system can shed light on application performance issues? This E-Guide details a four-step process for integrating apps into your SIM. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

TechTarget Security

SIM Technical Guide
sponsored by TechTarget Security
EZINE: In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.
Posted: 08 Mar 2013 | Published: 08 Mar 2013

TechTarget Security

Creating a Network Endpoint Security Policy for Hostile Endpoints
sponsored by TechTarget Security
EGUIDE: Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

TechTarget Security

Mobile: The Technology Game-Changer in 2013
sponsored by TechTarget Security
EGUIDE: TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

TechTarget Security

SIEM IT Decision Center- Checklist #2
sponsored by TechTarget Security
EGUIDE: This white paper presents SIEM use cases and technical information for security and compliance pros to better understand the threat landscape and help move their RFP process forward.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

TechTarget Security

SIEM IT Decision Center- Checklist #1
sponsored by TechTarget Security
EGUIDE: If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms.
Posted: 08 Feb 2013 | Published: 01 Jan 2013

TechTarget Security

Practitioners Guide to Establishing a SOC Webinar
sponsored by AT&T Cybersecurity
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AT&T Cybersecurity

Expect More From Your SIEM
sponsored by AT&T Cybersecurity
WEBCAST: Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AT&T Cybersecurity

Practitioner's Guide to Establishing an SOC
sponsored by AT&T Cybersecurity
WHITE PAPER: This white paper provides an overview of how to evaluate the security controls needed to establish a Security Operation Center (SOC), along with what data a SOC needs to quickly detect and respond to a breach.
Posted: 12 Jul 2013 | Published: 09 Apr 2013

AT&T Cybersecurity

Sharing Security Intelligence: How to Build a Strong Network
sponsored by Hexis Cyber Solutions Inc
EGUIDE: This expert e-guide from SearchSecurity.com explores how joining and creating strong security networks within which you share security intelligence data are crucial to avoiding security incidents and remaining secure.
Posted: 18 Jun 2013 | Published: 18 Jun 2013

Hexis Cyber Solutions Inc

Big Data Security Analytics: Harnessing New Tools for Better Security
sponsored by Hexis Cyber Solutions Inc
EBOOK: New techniques are emerging to help organizations analyze security data and improve security defenses.
Posted: 18 Jun 2013 | Published: 18 Jun 2013

Hexis Cyber Solutions Inc

Network Security Visibility and Analysis Technical Guide
sponsored by TechTarget Security
EZINE: This TechGuide explores how to improve network security visibility with network flow analysis tools, cloud security monitoring solutions and anomaly-based monitoring technology. Read on now to secure the data traveling across your network with these monitoring strategies.
Posted: 11 Jun 2013 | Published: 10 Jun 2013

TechTarget Security

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

Report: Cyber Security Attack and Incident Data
sponsored by IBM
WHITE PAPER: Uncover analysis of security attack and incident data from IBM Security Services' plethora of data collected from their tens of billions of events monitored daily for their 3,700+ clients.
Posted: 15 May 2013 | Published: 29 Mar 2013

IBM

Threat Detection (Antivirus Intrusion Prevention)
sponsored by TechTarget Security
EBOOK: Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
Posted: 03 May 2013 | Published: 03 May 2013

TechTarget Security

Threat Prevention Techniques: Best Practices for Threat Management
sponsored by GeoTrust, Inc.
EGUIDE: SearchSecurity.com put together this E-Guide to provide you with expert advice on creating an effective threat management program. View now for best practices that will help you build a strategy for your business.
Posted: 02 May 2013 | Published: 02 May 2013

GeoTrust, Inc.

Security Information Management Systems Aspire to Real-Time Security
sponsored by Hewlett Packard Enterprise
EGUIDE: Explore security information management (SIM) systems' capabilities for real-time security, learn why the definition of "real-time" may need altering, and uncover the factors preventing SIMs from attaining real-time status.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

Hewlett Packard Enterprise

Network Security Technologies Technical Guide
sponsored by TechTarget Security
WHITE PAPER: Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.
Posted: 03 Apr 2013 | Published: 31 Dec 2012

TechTarget Security

Computer Weekly – 2 April 2013: The benefits of context-aware security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at context-aware security – a next generation technology that promises to improve corporate information security. As banks implement more short-term fixes to cope with new regulations, we assess the IT implications. And we examine the benefits of executive coaching for CIOs. Read the issue now.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

TechTarget ComputerWeekly.com

Presentation Transcript: The Top 5 Pitfalls of Log Management and SIEM Deployments and How to Avoid Them
sponsored by eIQnetworks
PRESENTATION TRANSCRIPT: This valuable resource counts down the top 5 pitfalls of log management and security information and event management (SIEM) deployments and offers essential advice for avoiding these challenges and achieving SIEM success.
Posted: 15 Feb 2013 | Published: 04 Feb 2013

eIQnetworks