IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event ManagementReports
26 - 50 of 335 Matches Previous Page  | Next Page
2014 Cost of Cyber Crime Study: Australia
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper explores the economic impact of cyber-crime on Australia in 2014.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

Finding the Right Security Assessment Approach for Your Organization
sponsored by Dell SecureWorks
WHITE PAPER: Download this exclusive whitepaper to determine how you should be assessing your security and explore test options.
Posted: 19 Nov 2014 | Published: 13 Nov 2013

Dell SecureWorks

Raise Backup Success Rates with Data Protection Assessments
sponsored by APTARE
WHITE PAPER: This exclusive whitepaper argues for implementing comprehensive data protection assessments to improve your backup success rates.
Posted: 18 Nov 2014 | Published: 13 Nov 2008

APTARE

Beyond Shadow IT: A Proactive Approach to Reducing Risk While Embracing Cloud Services
sponsored by SkyHigh
WHITE PAPER: This exclusive whitepaper will teach you how to address shadow IT to ensure a stable, secure cloud environment.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

SkyHigh

The ESG Cybersecurity Maturity Model
sponsored by Hewlett-Packard Company
WHITE PAPER: Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced.
Posted: 18 Nov 2014 | Published: 22 Oct 2014

Hewlett-Packard Company

Addressing the Full Attack Continuum- A New Security Model For Before, During and After an Attack
sponsored by Cisco
WHITE PAPER: This important whitepaper will teach you how to develop a threat-centric security approach.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

Cisco

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: This exclusive whitepaper offers up 10 tips for improving your incident response capabilities.
Posted: 14 Nov 2014 | Published: 14 Nov 2013

Dell SecureWorks

Cisco 2014 Midyear Security ReportĀ - Executive Summary
sponsored by Cisco
WHITE PAPER: Download this exclusive whitepaper now for an overview of the security landscape midway through 2014, including threat intelligence, rising trends, and much more.
Posted: 14 Nov 2014 | Published: 14 Nov 2014

Cisco

2014 Cost of Cyber Crime Study
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Hewlett-Packard Company

Security Analytics and Intelligence Survey 2014
sponsored by Hewlett-Packard Company
WHITE PAPER: This survey of 350 IT professionals explores how IT security teams use security analytics and intelligence to help detect cyber attacks.
Posted: 12 Nov 2014 | Published: 15 Oct 2014

Hewlett-Packard Company

10 Steps for Implementing Strong Authentication in your Organization
sponsored by Gemalto
WHITE PAPER: This important whitepaper covers 10 crucial steps you must take to implement strong authentication in your organization.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Protecting your Executives and Important Information from Risk
sponsored by Gemalto
WHITE PAPER: Check out this exclusive whitepaper for an overview of protecting executive-level information and uncover some ways to simplify management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Tackle Inside Threats with Privileged Access Management
sponsored by Gemalto
WHITE PAPER: Download this exclusive whitepaper now to uncover how to manage privileged access and determine who should have what type of access. Also find stats about insider security breaches and more.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Streamline Windows 7 Migration with this Endpoint Manager
sponsored by IBM
WHITE PAPER: Check out this valuable whitepaper now to learn about an endpoint management solution that can consolidate your systems management infrastructure, automate your processes, clear out inefficiencies, and much more.
Posted: 11 Nov 2014 | Published: 11 Jul 2014

IBM

Know Your Endpoints to Prevent Security Breaches
sponsored by IBM
WHITE PAPER: This exclusive whitepaper covers how an IBM assessment can show you how secure your endpoints really are.
Posted: 11 Nov 2014 | Published: 13 Sep 2012

IBM

What is the impact to businesses when their web infrastructure is attacked?
sponsored by Akamai Technologies
VIDEO: Edward S Ferrara, Vice President & Principal Analyst at Forrester delves into the direct and indirect costs of attacks. To prepare yourself for attacks, download and view this video as a resource to refer to later when arming yourself against hackers.
Posted: 07 Nov 2014 | Premiered: 03 Nov 2014

Akamai Technologies

How to Deal with Increasing DDOS Attacks
sponsored by Verisign, Inc.
EGUIDE: This expert e-guide explores how to protect your organization from distributed denial of service attacks.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Verisign, Inc.

Delivering Compliance, Security and Operations Intelligence
sponsored by LogRhythm, Inc.
CASE STUDY: This exclusive case study explores the security solution a theater went with to protect the information of its customers and employees.
Posted: 06 Nov 2014 | Published: 14 Sep 2014

LogRhythm, Inc.

Incident Response: The New Paradigm
sponsored by TaaSera
WHITE PAPER: This exclusive whitepaper explores the new requirements your incident response system must be able to meet in order to keep your organization safe.
Posted: 05 Nov 2014 | Published: 15 Oct 2014

TaaSera

Proactive Responses to Today's Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores and endpoint management solution that can mitigate your risk of an attack and limit the damage when one happens.
Posted: 05 Nov 2014 | Published: 15 Oct 2014

IBM

Security Intelligence - Solving the Puzzle for Actionable Insight
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this exclusive whitepaper now to learn how to move beyond prevention alone with detection, security analytics and intelligence, and much more.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

LogRhythm, Inc.

Strangers in Your Servers: Make Working with IT Contractors More Secure
sponsored by ObserveIT
WHITE PAPER: Access this white paper to learn about a solution that keeps an eye on users consistently.
Posted: 04 Nov 2014 | Published: 04 Nov 2014

ObserveIT

DDoS Mitigation Best Practices for a Rapidly Changing Threat Landscape
sponsored by Verisign, Inc.
WHITE PAPER: This exclusive whitepaper explores five best practices for distributed denial of service attack mitigation.
Posted: 29 Oct 2014 | Published: 17 Oct 2012

Verisign, Inc.

Demo: RSA Security Analytics: SIEM Use Case
sponsored by RSA
VIDEO: Watch this demo to discover RSA Security Analytics 10.4 in action as it solves a complex security information and event management (SIEM) use case.
Posted: 29 Oct 2014 | Premiered: 29 Oct 2014

RSA

Finding an Evil in the Haystack
sponsored by EMC Corporation
WHITE PAPER: Learn about the tools, technologies and techniques required for comprehensive detection and remediation of advanced malware threats and why traditional signature-based approaches fall short of protecting your organization.
Posted: 29 Oct 2014 | Published: 18 Oct 2012

EMC Corporation
26 - 50 of 335 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement