Security Event Management Reports

SIEM IT Decision Center- Checklist #1
sponsored by TechTarget Security
EGUIDE: If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms.
Posted: 08 Feb 2013 | Published: 01 Jan 2013

TechTarget Security

Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
sponsored by TechTarget Security
EGUIDE: Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

TechTarget Security

Web-facing applications: Security assessment tools and strategies
sponsored by TechTarget Security
WHITE PAPER: Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected.
Posted: 08 Oct 2012 | Published: 08 Oct 2012

TechTarget Security

Effective Ways to Search Log Files
sponsored by TechTarget Security
EGUIDE: Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

TechTarget Security

E-Guide: Securing the SIEM system: Control access, prioritize availability
sponsored by TechTarget Security
EGUIDE: Given the vital role a security information and event management (SIEM) system plays in an organization’s security infrastructure, a compromised or crashed system can mean devastating consequences. This e-guide explores the serious implications of a corrupted SIEM system and offers helpful tips on how to secure them.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

TechTarget Security

Technical Guide on SIM: Moving beyond network security toward protecting applications
sponsored by TechTarget Security
EGUIDE: SIMs have been widely adopted for their value in correlating, reporting and alerting on network security. But SIMs can be used for more than just network security monitoring. The same tools can also bring value to application managers if used correctly. In this technical guide, gain 4 steps for integrating applications into enterprise SIMs.
Posted: 01 Jan 2012 | Published: 20 Dec 2011

TechTarget Security

Log management best practices
sponsored by TechTarget Security
EGUIDE: Investing in the correct log management tool can ensure that the pressures of maintaining enterprise system log data are greatly decreased. Although the right tool is very helpful, the possibility of it turning into the wrong tool can happen in the blink of an eye if the correct steps are not taken.
Posted: 29 Nov 2011 | Published: 29 Nov 2011

TechTarget Security

E-Guide: Selecting a SIM for midmarket business
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses the evolvement of SIM tools, differences in deployment processes and top requirements you should consider before making a decision.
Posted: 01 Nov 2011 | Published: 31 Oct 2011

TechTarget Security

Presentation Transcript: Content Monitoring in the Enterprise
sponsored by Lumension
PRESENTATION TRANSCRIPT: This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Lumension

10 Steps for Early Incident Detection
sponsored by Tripwire, Inc.
WHITE PAPER: The earlier a security breach is detected, the faster an organization can recover. View this informative white paper to learn more about the ten steps to faster detection of security incidents. IT security is only as effective as it's response time, so be sure you're prepared for a breach.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

Tripwire Log Center Product Brief
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

Smart, Visible and Automated: The New Log Management
sponsored by Tripwire, Inc.
WHITE PAPER: View this informative white paper to learn more about moving to a more advanced risk protection policy. Improve your log management capabilities by implementing functionality with SIEM, file integrity monitoring and more!
Posted: 27 Sep 2012 | Published: 28 Sep 2012

Tripwire, Inc.

Magic Quadrant for Security Information and Event Management
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

Hewlett-Packard Enterprise

Four Things You Should Know About Securing Your Growing Business
sponsored by Symantec Corporation
WHITE PAPER: SMBs may not have the same resources as their enterprise counterparts, but they face the same threats. In the resource, uncover 4 things you should know about securing your growing business and how to protect all points of your organizations more efficiently, without straining your resources.
Posted: 06 Jul 2012 | Published: 06 Jul 2012

Symantec Corporation

The Security for Business Innovation Council (SBIC) report, 'Getting Ahead of Advanced Threats'
sponsored by EMC Corporation
WHITE PAPER: In an era of advanced threats, having greater situational awareness is vital for detecting and mitigating attacks. Unfortunately, most organizations lack the capability for intelligence gathering and analysis. In this comprehensive report, gain guidance from top security leaders on how to get ahead with intelligence-driven information security.
Posted: 22 May 2012 | Published: 21 May 2012

EMC Corporation

University of the Sunshine Coast Improves Security with Sentinel
sponsored by NetIQ
CASE STUDY: Access this case study to uncover how Sentinel helped one educational institution cost-effectively meet audit requirements for monitoring access to core finance systems, provide simpler access to network resources for users while improving security.
Posted: 18 May 2012 | Published: 17 May 2012

NetIQ

Establishing a Formal Cyber Intelligence Capability
sponsored by Verisign, Inc.
WHITE PAPER: While the benefits of advanced intelligence are substantial, achieving the capability requires a careful planning and consideration. In this paper, uncover best practices and a proven process for establishing a formal cyber intelligence capability as well as explore key considerations.
Posted: 03 May 2012 | Published: 03 May 2012

Verisign, Inc.

Palo Alto Networks in the Data Center: Eliminating Compromise
sponsored by Palo Alto Networks
WHITE PAPER: This resource explores best practices for data center network security. Learn how to protect your business without compromising flexibility and application availability.
Posted: 20 Apr 2012 | Published: 20 Apr 2012

Palo Alto Networks

The changing SIEM landscape: What you should know to stay ahead
sponsored by TechTarget Security
EGUIDE: While SIEM systems are often expensive and complex, they play a vital part in your risk and compliance strategy. This technical guide on SIM explores SIEM technologies today and offers exclusive tips and considerations for your deployment.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

TechTarget Security

Presentation Transcript: Balancing compliance with security
sponsored by HP Enterprise Security
PRESENTATION TRANSCRIPT: This presentation transcript explores exactly what it means to be secure and compliant, as well as how security information management (SIM) can assist organizations in achieving both.
Posted: 30 Mar 2012 | Published: 20 Mar 2012

HP Enterprise Security

Improving regulatory compliance management through log analysis, SIM
sponsored by HP Enterprise Security
EGUIDE: This E-Guide highlights the importance of log analysis and security information and event management (SIEM) in improving regulatory compliance management.
Posted: 30 Mar 2012 | Published: 30 Mar 2012

HP Enterprise Security

Continuous Monitoring: Responding to New Threats in More Complex IT Environments
sponsored by Tripwire, Inc.
WHITE PAPER: Governments today are focusing on the practice of continuous monitoring as a means to providing the much needed balance between data access and protection. In this paper, learn more about continuous monitoring, including what is it and why it’s needed, guidelines for implementing it, key capabilities of an effective solution, and more.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Tripwire, Inc.

Tripwire IT Security & Compliance Automation Solutions –Empowering IT Security in an Insecure World
sponsored by Tripwire, Inc.
WHITE PAPER: In this solution brief, discover how Tripwire IT security and compliance automation solutions provides the visibility, intelligence and automation of IT security controls needed to gain confidence in the protection of your data.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Tripwire, Inc.

IT Decision Checklist: Security Information and Event Management
sponsored by HP Enterprise Security
EZINE: As the complexity of the networks IT manages continues to increase, so too does the volume of security-related information generated by network devices. This exclusive e-zine explores the business and technical considerations in selecting the security information management (SIM) tools you need to maintain control.
Posted: 24 Feb 2012 | Published: 23 Feb 2012

HP Enterprise Security

Zero Trust Model: Securing the Extended Enterprise
sponsored by Sophos
EGUIDE: The emergence of new connection options and devices being introduced to the enterprise are extending networks well beyond their controllable boarders. This expert resource offers insight into securing the extended enterprise, exploring the strategy behind Zero Trust Model, creating network security policies for hostile endpoints and more.
Posted: 02 Feb 2012 | Published: 02 Feb 2012

Sophos