IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
51 - 75 of 418 Matches Previous Page  |  Next Page
State-sponsored Hacking troubles US Government
sponsored by LogicNow
EGUIDE: This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
Posted: 01 Feb 2016 | Published: 25 Jan 2016

LogicNow

Gartner: Magic Quadrant for Mobile Data Protection
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to discover treat data encryption protection as a standard for all workstations.
Posted: 01 Feb 2016 | Published: 19 Oct 2015

Digital Guardian

Gartner Report: Best Practices for Detecting and Mitigating Advanced Persistent threats
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn how to implement specific strategic best practices to detect and mitigate persistent threats and target malware.
Posted: 01 Feb 2016 | Published: 04 May 2015

Digital Guardian

5 Ways Your Vendor Risk Management Program Leaves You in the Dark
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn the steps it takes to protect your data and implement a solid vender risk management (VRM) program.
Posted: 29 Jan 2016 | Published: 02 Dec 2015

BitSight

Gartner Competitive Landscape: Endpoint Detection & Response (EDR)
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will examine critical EDR customer buying behaviors, solution use cases and technologies that product managers and marketing professionals must consider.
Posted: 29 Jan 2016 | Published: 26 Nov 2014

Digital Guardian

Gartner Competitive Landscape: Data Loss Prevention Market 2015
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn the main drivers of DLP adoption and the future of the DLP industry as a whole.
Posted: 29 Jan 2016 | Published: 22 Oct 2015

Digital Guardian

Information Governance Audit: 5 Steps You Should Take
sponsored by Veritas
RESOURCE CENTER: Access this article to learn how to better perform security audits and keep your IT environment safe and secure.
Posted: 29 Jan 2016 | Published: 30 Dec 2015

Veritas

5 Steps to Achieve Risk-based Application Security Management
sponsored by IBM
WHITE PAPER: This white paper will show you how to make applications security a strategically managed process.
Posted: 29 Jan 2016 | Published: 31 Jul 2015

IBM

The State of Mobile Application Security (4th Edition)
sponsored by IBM
WHITE PAPER: This white paper will give you the latest statistics of online piracy and show you what you can do to protect your IP.
Posted: 29 Jan 2016 | Published: 10 Dec 2015

IBM

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This white paper infographic will show you specific instances of cybercrime around the world and against what applications were vulnerable.
Posted: 28 Jan 2016 | Published: 15 Dec 2015

Dimension Data

Security for Virtual Machines
sponsored by TechData Corporation
WHITE PAPER: In this white paper you will discover how you can achieve outstanding, multi-layered, granular protection for your VDI and virtual server environments with little impact on responsiveness on virtualized workloads.
Posted: 28 Jan 2016 | Published: 14 Dec 2015

TechData Corporation

What Story Does Your IT Security Tell?
sponsored by Prelert
DATA SHEET: In this resource, you will discover how to analyze log data and locate anomalies in order to combat advanced cyberthreats with an anomaly detection application. Access this resource to apply behavioral analytics to any data resource—including Windows event logs, DNS logs, and firewall logs.
Posted: 28 Jan 2016 | Published: 31 Dec 2015

Prelert

The ISO 27001 Information Security Framework
sponsored by Coalfire
WEBCAST: This webcast introduces the ISO 27001 standard and how businesses can benefit from its framework to manage security.
Posted: 27 Jan 2016 | Premiered: Oct 27, 2015

Coalfire

Powerful Data Protection, Anywhere
sponsored by Vera
WHITE PAPER: In this white paper, discover how you can secure all of your devices and applications. Find out how you can effortlessly collaborate with anyone from anywhere.
Posted: 27 Jan 2016 | Published: 02 Dec 2015

Vera

The Expectation of SSL Everywhere
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will learn about the importance of SSL in securing personal data as it's grown since the Internet's inception and how it's brought cryptography to the common man.
Posted: 27 Jan 2016 | Published: 02 Dec 2015

F5 Networks

RA SSL Everywhere Infographic v1
sponsored by F5 Networks
RESOURCE: In this white paper, you will learn how SSL adoption has grown and continues to grow year over year and how cybercrime is forcing everyday sites like Facebook to quickly embrace SSL's. You will discover how you can beef up your security layers to stay ahead of ever-evolving threats.
Posted: 27 Jan 2016 | Published: 16 Dec 2015

F5 Networks

Cyberattacks Mean Big Bills for Businesses
sponsored by TechData Corporation
WHITE PAPER: In this white paper you will see examples of different businesses' data breaches and how they had to deal with them financially. You will also discover the top causes and consequences of cyberattacks beyond financials.
Posted: 26 Jan 2016 | Published: 09 Dec 2015

TechData Corporation

Virtualization: Superior, Flexible and Efficient Protection
sponsored by TechData Corporation
WHITE PAPER: Access this white paper and learn how to protect for your virtual servers and desktop environments. Find out how your organization can achieve outstanding protection, better performance and greater efficiency.
Posted: 26 Jan 2016 | Published: 31 Dec 2014

TechData Corporation

Gartner: Data Loss Prevention Magic Quadrant for Content-Aware Data Loss Prevention
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to see how content-aware DLP solutions incorporate sophisticated detection techniques to help businesses address their more critical data protection requirements.
Posted: 26 Jan 2016 | Published: 12 Dec 2013

Digital Guardian

The Realities of FedRAMP Continuous Monitoring and Penetration Testing Requirements
sponsored by Coalfire
WEBCAST: This webcast explores the requirements that CSPs must meet on monthly, quarterly and an annual basis. Find answers to common FedRAMP questions, solutions for complexities that continuous monitoring can present and lessons learned from the continuous monitoring portion of FedRAMP.
Posted: 26 Jan 2016 | Premiered: Sep 16, 2015

Coalfire

FedRAMP for SaaS
sponsored by Coalfire
WEBCAST: Watch this webcast to discover how FedRAMP can increase your confidence in the security of your cloud solutions.
Posted: 26 Jan 2016 | Premiered: Mar 18, 2015

Coalfire

Secure Any Data, Anywhere
sponsored by Vera
WHITE PAPER: In this white paper, you will learn how to effectively protect any kind of data. Find out how you can track, audit and manage the policies in real-time and secure your data no matter what device, person, cloud or application it travels to.
Posted: 25 Jan 2016 | Published: 01 Dec 2015

Vera

IDC: Securing Data in a Borderless Enterprise
sponsored by Vera
WHITE PAPER: Access this white paper and learn how you can set security and sharing policies for your data wherever it goes, set and change data-access rights in real time, control what people can and can't do with data, and more.
Posted: 25 Jan 2016 | Published: 08 Jul 2015

Vera

SIEM Solution Report: How Did Yours Score?
sponsored by IBM
WHITE PAPER: This report looks at 13 SIEM tools and identifies each one's strengths and cautions. Access now to determine if your ideal SIEM strategy is a niche player, a visionary, a challenger, or a leader.
Posted: 25 Jan 2016 | Published: 20 Jul 2015

IBM

The C-Suite & Cybersecurity: Six Reasons to Step up Your Security Game This Year
sponsored by AllClear ID
WHITE PAPER: In this white paper, Forrester Research describes the six most significant changes coming to security economics, government policy, the role of business in 2016 and what you should do about them.
Posted: 25 Jan 2016 | Published: 07 Dec 2015

AllClear ID
51 - 75 of 418 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement