IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
51 - 75 of 816 Matches Previous Page  |  Next Page
Nucleus Research Guidebook: IBM QRadar on Cloud
sponsored by IBM
RESOURCE: Learn how to eliminate the need for expensive hardware and IT personnel oversight by utilizing the cloud. Deploy quickly and achieve faster time to value with a growing range of additional cloud security services. Realize the benefits of a managed cloud infrastructure and more through this brief resource.
Posted: 19 Sep 2016 | Published: 31 Aug 2016

IBM

An Agent of Change in an Era of Intensifying Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover a defense system tailored specially for your network that includes advanced sandboxing with CPU-level detection. Take the on-going cyberwar back to your cyberthieves' doorsteps by understanding the tools they use, their chosen attack vectors and the methods they employ.
Posted: 19 Sep 2016 | Published: 31 Aug 2016

Check Point Software Technologies Ltd.

BYOD & MDM: Why you’re still at risk – and what you can do about it
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper discover how you can reap the benefits of BYOD and MDM while also keeping your data and devices secure. Also uncover 9 threats that MDM solutions often fail to catch.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Proofpoint, Inc.

Preventing Ransomware Threats to Health Data in 10 Steps
sponsored by OpenDNS
WHITE PAPER: Health data has become some of the most sought-after personal data on the black market, making healthcare professionals and hospital systems prime targets for cybercrime – particularly ransomware attacks. This e-guide will provide you with 10 steps to avoid ransomware attacks on your health systems.
Posted: 16 Sep 2016 | Published: 14 Sep 2016

OpenDNS

How Healthcare Organizations are Tackling IoT Device Management
sponsored by OpenDNS
EGUIDE: Connected medical devices are becoming more widespread in healthcare, but security and management options are limited for IT teams. This e-guide will teach you how to devise a plan to secure each device from surface attacks and cyberthreats. Plus, see how several vendors are tackling this problem and offering tools to keep patient data safe.
Posted: 16 Sep 2016 | Published: 14 Sep 2016

OpenDNS

2016 Data Threat Report: Trends in Encryption and Data Security
sponsored by Vormetric
WHITE PAPER: Access this report now to learn statistics from around the globe describing how large enterprises are misplacing their security dollars and what you can do to best protect your sensitive data in today's hostile cyber environment.
Posted: 15 Sep 2016 | Published: 01 Aug 2016

Vormetric

Data Access Governance Solutions On-Demand Demo
sponsored by STEALTHbits
WEBCAST: This 60-minute webinar will teach you how your organization can implement a concrete data access governance program that won't break your back, or the bank. You'll learn both tactical and strategic approaches to unstructured data management and have your most important questions answered along the way.
Posted: 14 Sep 2016 | Premiered: Dec 31, 2015

STEALTHbits

Outsmarting Ransomware: Protect Your Money and Assets
sponsored by arcserve
WEBCAST: Watch this highly informative webinar from featuring IT security leaders as they teach you how to defeat those ransomware hackers lurking in the dark of cyberspace. You'll discover preventative measure and remediation strategies to keep your organization safe.
Posted: 14 Sep 2016 | Premiered: Aug 1, 2016

arcserve

Microsoft Office 365: Enabling More Secure Collaboration
sponsored by VMware, Inc.
WHITE PAPER: Learn how you can best take control of Office 365's anytime-anywhere collaboration while also maintaining secure access to corporate data. Explore three steps designed to help you realize this goal quickly and securely.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

VMware, Inc.

Addressing the Full Attack Continuum (BDA WP)
sponsored by Cisco Systems, Inc.
WHITE PAPER: It's time for a new threat-centric security model that delivers the visibility and control your organization needs. Discover how to reduce the complexity of threat management while gaining continuous control and advanced threat protection across the entire attack continuum. Act smarter and quicker before, during and after an attack.
Posted: 13 Sep 2016 | Published: 31 Dec 2014

Cisco Systems, Inc.

Open Access : Restrict access where it need be restricted
sponsored by STEALTHbits
WHITE PAPER: Discover how to discern who has access to your unstructured data and see all open shares on your network. Protect against malicious access, reduce security risk, fulfill compliance requirements and decrease operations expense by first accessing this valuable resource.
Posted: 13 Sep 2016 | Published: 31 Dec 2015

STEALTHbits

Buyer's Guide - DAG
sponsored by STEALTHbits
RESOURCE: This buyer's guide will help choose the best available Data Access Governance solution. The information contained within can be used in creating a request for information (RFI) or request for proposal (RFP) and evaluating Data Access Governance products.
Posted: 13 Sep 2016 | Published: 31 Dec 2015

STEALTHbits

Securing Connected Cars Through Comprehensive Software Testing
sponsored by Synopsys
WHITE PAPER: There is a need for greater software testing and assurance in the automotive industry today. Dig deeper into the vulnerabilities associated with automotive software and learn how to test it before your vehicle roles into the dealership.
Posted: 13 Sep 2016 | Published: 01 Aug 2016


Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Uncover an in-depth look into the modern threat landscape of mobile security, where it has come from, and where it is going. Discover how new threats have emerged on the scene, what tactics they are using, and how to effectively counter them.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

MobileIron

Advanced Security Platform for Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: If your organization is looking to migrate to Microsoft Office 365, you might be wondering whether additional security is needed. Discover how to safeguard users against advanced threats and targeted attacks and gain the power to identify these attacks as they happen.
Posted: 12 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

Top 5 Social Media Scams of 2016
sponsored by Proofpoint, Inc.
VIDEO: This video takes a look at the top 5 social media scams you can encounter today. Discover what methods scammers are using in 2016, including bogus surveys, fake subscription sign-ups and imposter social media accounts.
Posted: 12 Sep 2016 | Premiered: 12 May 2016

Proofpoint, Inc.

Protecting Against Impostor Email Threats
sponsored by Proofpoint, Inc.
VIDEO: Learn how to combat imposter emails and other advanced threats by watching this short video. Get detailed email analysis to oust spam, phishing, malware and now imposter emails quickly before they reach your employees.
Posted: 09 Sep 2016 | Premiered: 12 Apr 2016

Proofpoint, Inc.

Cyber Ransom Survival Guide
sponsored by Radware
WHITE PAPER: The following resource offers a concise overview of ransomware -- including the current threat landscape, who's likely to be targeted, and the marketplace and tools fueling the trend. Access now and you'll also learn about questions you need to ask and next steps you need to take to safeguard your organization.
Posted: 09 Sep 2016 | Published: 09 Sep 2016

Radware

Safeguarding Office 365
sponsored by Proofpoint, Inc.
WEBCAST: Discover how to get full attack chain detection for Office 365 through this short video. Learn how you can achieve complete coverage from advanced threats, both known and unknown across your entire global network.
Posted: 09 Sep 2016 | Premiered: Aug 1, 2016

Proofpoint, Inc.

3 Steps to Getting Data Access Governance off Your To Do List
sponsored by STEALTHbits
WHITE PAPER: Data Access Governance (DAG) has been that to-do item IT Security has had for years, but they just kept pushing it aside for other goals. Today, however, there are strategies which can make DAG more approachable. In this free White Paper we are going to break DAG down into 3 steps that you can use to finally check this big one off your list.
Posted: 09 Sep 2016 | Published: 31 Dec 2015

STEALTHbits

314 Day Battle Plan - The Modern Cybercriminal's Attempt to Stay Undetected
sponsored by Dell SecureWorks
WHITE PAPER: This short infographic gives you an in-depth look at the timeline of the average data breach from penetration to detection. Learn the game plan of a cybercriminal looking to steal your data and prepare a defensive scheme of your own to stop hackers in any phase of the breach lifecycle.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

Dell SecureWorks

Enabling The Industrial Internet Through Software Assurance
sponsored by Synopsys
WHITE PAPER: Access this white paper to better understand the far reaching effects vulnerable industrial technologies could have on the world. Learn from organizations who have dealt with crippling cyber attacks and discover how to instill confidence in your devices' security moving forward.
Posted: 08 Sep 2016 | Published: 01 Aug 2016


Best Practices for Social Media Archiving and Security
sponsored by Proofpoint, Inc.
WHITE PAPER: While social media can provide a number of important benefits to organizations, increasing use of social media comes with several security/compliance risks and costs. Uncover social media usage statistics, risk possibilities and how to best employ social media securely for your organization.
Posted: 08 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

NGFW Requirements for SMBs and Distributed Enterprises
sponsored by Cisco Systems, Inc.
WHITE PAPER: Within this informative white paper, you'll discover NGFWs specifically tailored for your SMB as well as distributed enterprises. Learn how to achieve next generation security with advanced threat protection, low TCO, and flexible management.
Posted: 08 Sep 2016 | Published: 01 Aug 2016

Cisco Systems, Inc.

Understanding Account Takeover Attacks
sponsored by IMMUNIO, Inc.
WHITE PAPER: Discover the necessary steps to prevent hacking via stolen credentials on your web applications. Learn how to protect your online accounts and get to the bottom of why hackers want to take over these accounts.
Posted: 08 Sep 2016 | Published: 01 Aug 2016

IMMUNIO, Inc.
51 - 75 of 816 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement