IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
26 - 50 of 686 Matches Previous Page  |  Next Page
2016 Security Pressures Report
sponsored by SingTel
WHITE PAPER: The recommendations in this resource can serve as a reliable compass for where your security efforts need to be going into the future. These best practices will not only placate security pressure, but also help make your organization more secure overall.
Posted: 04 Jan 2017 | Published: 31 Dec 2016

SingTel

A Whale of a Tale: How to Stop the Rising Tide of Impersonation Attacks
sponsored by Mimecast North America
WHITE PAPER: Learn how whaling works, what the tell-tale signs are, and what can be done to safeguard your organization from its ravages. Read on for an in-depth breakdown of a typical whaling attack and where to look for help for threat protection.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

Anatomy of a Whaling Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast North America
WHITE PAPER: Learn the anatomy of a whaling attack – an email scam that can threaten every member of your enterprise, from entry-level to the C-suite. Download this e-book now and learn 6 ways to defend against this potentially crippling attack.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

Achieving End-to-End Security in the Internet of Things
sponsored by Cisco Systems, Inc.
WHITE PAPER: Minimize risk and optimize operations for mission-critical connected devices using cellular IoT for secure connections. Learn how you can capitalize on the IoT's endless possibilities without becoming tomorrow's headline
Posted: 27 Dec 2016 | Published: 30 Jun 2016

Cisco Systems, Inc.

Innovative Monetization Approaches for Home Security and Automation Organizations
sponsored by Cisco Systems, Inc.
WHITE PAPER: Take an in-depth look at four innovative IoT approaches home security organizations are using to expand their services and grow their bottom line.
Posted: 27 Dec 2016 | Published: 30 Apr 2016

Cisco Systems, Inc.

How to Create a Holistic Strategy for Office 365 Data Protection
sponsored by AvePoint, Inc.
WHITE PAPER: Learn how to make security part of your regular workflow with tools that help integrate compliance into everyday business use of Office 365. Discover how to minimize the risk of a breach and ensure uninterrupted user workflow by baking in compliance tools from the beginning.
Posted: 23 Dec 2016 | Published: 30 Nov 2016

AvePoint, Inc.

Oh #@$%! I've Been Breached: What to do Next
sponsored by Armor
WHITE PAPER: Learn how to not only put together an incident response plan (IRP), but what to do during and afterwards to reduce downtime and smoothly transition back to normal operations as quickly as possible.
Posted: 22 Dec 2016 | Published: 22 Dec 2016

Armor

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Manage Risk by Protecting the Apps and Data that Drive Business Productivity
sponsored by Citrix
WHITE PAPER: Traditional perimeter-based security has been rendered ineffective by mobility and the cloud. In this infographic, learn how to successfully navigate the increasingly volatile IT business environment and take a new approach to information security.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Two-Factor Authentication Helps Officers Protect and Serve New York
sponsored by BlackBerry
WHITE PAPER: Learn how field officers of the Suffolk County Police Department of Long Island, NY utilize two-factor authentication to protect and serve their constituents and keep their database safe.
Posted: 20 Dec 2016 | Published: 30 Nov 2016

BlackBerry

Protecting the 3 Areas of Secure Mobility
sponsored by BlackBerry
WHITE PAPER: Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.
Posted: 20 Dec 2016 | Published: 30 Nov 2016

BlackBerry

Exploit Kits: Getting In by Any Means Necessary
sponsored by Palo Alto Networks
WHITE PAPER: This white paper explores the concept of exploit kits and how to defend against them. Uncover tips for reducing your attack surface, blocking known malware and exploits, identifying new threats, and more.
Posted: 19 Dec 2016 | Published: 19 Dec 2016

Palo Alto Networks

Mobile Security Checklist: Top Ten Threats to Your Enterprise Today
sponsored by BlackBerry
WHITE PAPER: Access this white paper to find an overview of the key issues you need to be on top of right now to protect your organization, its employees and its customers.
Posted: 19 Dec 2016 | Published: 19 Dec 2016

BlackBerry

Data Breaches: Is Prevention Practical?
sponsored by Palo Alto Networks
RESEARCH CONTENT: Increased reliance on digital environments only expands the attack landscape for data breaches. Explore this survey to find out how organizations are handling data breach prevention and uncover key findings about which preventative practices are most effective for data security.
Posted: 19 Dec 2016 | Published: 30 Sep 2016

Palo Alto Networks

5 Tips to Securely Enable File Sharing and Mobile Productivity
sponsored by BlackBerry
WHITE PAPER: Discover five ways to securely enable fire sharing and mobile productivity. You'll learn how to maximize productivity through easy document sharing and protect those documents on and off device.
Posted: 16 Dec 2016 | Published: 30 Nov 2016

BlackBerry

Best Practices for Healthcare Data Breach Prevention
sponsored by Absolute
WHITE PAPER: As healthcare records grow in value and popularity in underground markets, it's more important than ever to have airtight data protection and breach prevention protocols in place to keep patients' information safe. Whether you're in healthcare or another industry, learn how to keep information secure with data breach protection best practices.
Posted: 16 Dec 2016 | Published: 30 Nov 2016

Absolute

Web Application Firewall: Delivering Must-Have Protection for the Modern Enterprise
sponsored by Citrix
WHITE PAPER: To thoroughly protect numerous web properties, you need to supplement basic network security and firewall solutions with web application firewall tools. Learn what's currently available as essential components for web protection.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

Citrix

Stop Ransomware Before it Starts
sponsored by Carbon Black
EBOOK: There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Carbon Black

Six Steps to Effective Healthcare Data Breach Response
sponsored by Absolute
WHITE PAPER: Healthcare organizations must take into consideration these 6 steps to an effective data breach response. You'll learn how to not only minimize the damage from an incident, but also avoid reputational ruin through patient notification and timely updates of the situation.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Absolute

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute
WHITE PAPER: Whether it is from human error or malicious outsiders, a diligent IT department can diminish the risk of lost or stolen data. Learn 7 best practices healthcare organizations can put in place to ensure the safety of patient information on mobile devices.
Posted: 15 Dec 2016 | Published: 31 Dec 2015

Absolute

The Suspicious Seven: A Network Visibility Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover an outline of seven of the most common types of network blind spots and suspicious activities that every security team needs to be able to see.
Posted: 14 Dec 2016 | Published: 14 Dec 2016

Cisco Systems, Inc.

Best Practices for Dealing With Phishing and Ransomware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research white paper focuses on current problems in security with phishing and ransomware, and gives recommendations on how to mitigate these threats. Learn how to implement security awareness training for all users, maintain quality backups and implement detection and elimination systems for your network.
Posted: 14 Dec 2016 | Published: 30 Sep 2016

KnowBe4

Best Practices for Dealing with Phishing and Next-Generation Malware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research study focuses on the current security problems with email and other systems, and offers recommendations about how to improve security. Learn how to combat phishing and next-gen malware threats through a variety of best practices, beginning with user training.
Posted: 14 Dec 2016 | Published: 30 Apr 2015

KnowBe4

The Foundation of Next-Gen Enterprise Security is Embedded in your Endpoints
sponsored by Absolute
WHITE PAPER: As the lines between corporate and personal have blurred, or even blended altogether, the enterprise security team has less and less true control over all of the endpoints being used by employees. Learn how to activate embedded security in your endpoints to ensure complete protection of your valuable assets.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Absolute

IDC Technology Spotlight: Modern "Embedded" Endpoint Security
sponsored by Absolute
WHITE PAPER: This IDC Technology Spotlight explains why modern endpoint security strategies need an innovative approach that maintains always-on IT connectivity to corporate laptops and mobile devices. Learn how to maintain vigilance and identify threats at the earliest stages before a breach can occur.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Absolute
26 - 50 of 686 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement