IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event ManagementReports
51 - 75 of 342 Matches Previous Page  | Next Page
DDoS Mitigation And DNS Availability Should Be Key Components of Resiliency Strategy
sponsored by Verisign, Inc.
WHITE PAPER: This exclusive whitepaper explores an in-depth Forrester survey of 245 IT professionals from enterprises in the US and UK, looking at how they deal with DDoS and DNS security.
Posted: 22 Oct 2014 | Published: 12 Dec 2013

Verisign, Inc.

Improve Intrusion Detection with Effective Threat Management
sponsored by Alert Logic
CASE STUDY: This exclusive case study explores the threat management solution one organization chose to improve their intrusion detection.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Alert Logic

Head First into the Sandbox
sponsored by Fortinet, Inc.
WHITE PAPER: Access this exclusive whitepaper now to learn about the evolution of sandboxing and explore some advanced evasion techniques.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Fortinet, Inc.

The Fortinet Security Census 2014
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive whitepaper reveals the results of and IT security census of more than 1,600 qualified IT decision makers.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Fortinet, Inc.

Next-Generation Firewall Product Analysis
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive whitepaper offers a detailed performance report on one next-generation firewall solution.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Fortinet, Inc.

6 Ways Hackers Try to Break Secure Sockets Layer-Encrypted Data
sponsored by Blue Coat Systems
EGUIDE: How do hackers break through secure sockets layer-encrypted data exactly? This expert e-guide has the answer, exploring six common methods these cyber-criminals use.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Blue Coat Systems

Simplified Third-Party Patching for Microsoft System Center with Shavlik
sponsored by Shavlik Technologies
WEBCAST: This exclusive webcast explores a solution that expands Microsoft System Center Configuration Manager's patching capabilities to cover third-party applications.
Posted: 14 Oct 2014 | Premiered: Oct 14, 2014

Shavlik Technologies

An Incident Response Playbook: From Monitoring to Operations
sponsored by AlienVault
WEBCAST: This exclusive webcast examines how to improve incident detection and response capabilities to match the vast array of cyber-attacks that exist today.
Posted: 10 Oct 2014 | Premiered: Oct 10, 2014

AlienVault

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

Mitigating Risks of Cloud Computing with SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines an overview of cloud computing, highlighting its advantages as well as its concerns.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

Next-generation guest network access for GenMobile
sponsored by Aruba Networks
WHITE PAPER: Users today expect to connect from anywhere and giving them high-performance guest access is absolutely essential.  Weak security on the guest network can expose your business to external threats and could cause serious liablility issues.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Aruba Networks

2014 Gartner SIEM Market Report: Which Vendors Deliver?
sponsored by IBM
WHITE PAPER: In this Gartner report, get the facts on today's SIEM vendor landscape with in-depth evaluations and breakdowns of the top players and products in the industry.
Posted: 16 Sep 2014 | Published: 25 Jun 2014

IBM

Securosis Analyst Report: Is It Time to Replace Your Current SIEM Solution?
sponsored by IBM
WHITE PAPER: In this in-depth white paper, gain critical insights into how to evaluate, select, and deploy the right SIEM solution for your organization's specific needs.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

How Security Information and Event Management Solutions Perform in the Real World
sponsored by IBM
WHITE PAPER: In this Ponemon Institute study, get the facts on today's best SIEM solutions and how they perform in real-world scenarios.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

Need for Speed: Streamlining Response and Reaction to Attacks
sponsored by Intel Security
WHITE PAPER: This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting.
Posted: 10 Sep 2014 | Published: 31 May 2013

Intel Security

Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
sponsored by Intel Security
WHITE PAPER: SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Posted: 10 Sep 2014 | Published: 31 May 2013

Intel Security

Securosis Report: Replacing Your SIEM Yet?
sponsored by Intel Security
WHITE PAPER: This report offers pragmatic advice and walks you through the entire process of updating your SIEM solution for improved threat management, operational efficiency and compliance.
Posted: 10 Sep 2014 | Published: 01 Feb 2014

Intel Security

Cloud and Compliance in One – Is It Possible?
sponsored by Intel Security
WHITE PAPER: Read this insightful report on an integrated security system that help organization stay protected and compliant in cloud-based environments.
Posted: 09 Sep 2014 | Published: 31 Dec 2013

Intel Security

SIEM: Keeping Pace with Big Security Data
sponsored by Intel Security
WHITE PAPER: This detailed report explores how intelligent and scalable Security Information and Event Management (SIEM) solutions can help you stay on top of an ever-evolving, data-driven environment.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

Intel Security

Leverage Security Event Data to Improve Vulnerability Detection & Remediation
sponsored by Intel Security
WHITE PAPER: Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data for better and more accurate reporting.
Posted: 09 Sep 2014 | Published: 31 Oct 2013

Intel Security

McAfee Positioned in Leaders Quadrant of the Magic Quadrant for SIEM
sponsored by Intel Security
WHITE PAPER: In this informative report, discover why McAfee's Enterprise Security Manager is turning heads in the security industry.
Posted: 05 Sep 2014 | Published: 25 Jun 2014

Intel Security

How Do Top SIEM Products Compare in Common Client Deployment Scenarios?
sponsored by IBM
WHITE PAPER: This resource from Gartner evaluates vendors' SIEM products and services based on their ability to fulfill users' requirements in the areas of compliance, threat management, and SIEM, helping organizations to select the solution that best fits their particular needs.
Posted: 27 Aug 2014 | Published: 25 Jun 2014

IBM

Guarding Against a Data Breach
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, discover how modern enterprises should respond to growing security threats while balancing economic and organizational concerns.
Posted: 22 Aug 2014 | Published: 31 Jan 2012

Hewlett-Packard Company

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: Data collection plays a huge role in today's security landscape, and this guide explores 10 ways that you can achieve effective security by utilizing big data analytics.
Posted: 19 Aug 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

How SIEM Helps IT Security, Compliance, Operations and Management
sponsored by CDW Corporation
WHITE PAPER: Security information and event management (SIEM) tools offer more than just security. In fact, many organizations overlook some of the most useful aspects of SIEM technology, including fraud prevention and operations management. In this expert resource, discover the value of SIEM tools for four different audiences.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

CDW Corporation
51 - 75 of 342 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement