IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
76 - 100 of 774 Matches Previous Page  |  Next Page
See How a Major National Security Agency Protects its Sensitive Data
sponsored by Ghangor Cloud
CASE STUDY: Discover how a leading southeast Asian country's national security agency recently upgraded their data leak prevention mechanisms. Learn how they were able to safeguard sensitive national security information, financial transaction information and other confidential mission critical information.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

Ghangor Cloud

Choose the Path to Complete Mobile Security and Productivity
sponsored by MobileIron
WHITE PAPER: Learn how MobileIron and Blackberry match up on vital criteria for enterprise mobility management and how your organization can reap the benefits of pairing with the right one for your particular needs.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

MobileIron

Security: Making a Better Case for Technology in the Classroom
sponsored by Absolute
WHITE PAPER: Explore how educators can ensure the security and efficacy of desktop and mobile devices used by students and staff in K–12 schools while reducing IT administration and management demands and remaining compliant.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

Absolute

Connectivity Options For Microsoft Office 365
sponsored by Zscaler
WHITE PAPER: In September 2016, Microsoft introduced new guidance on best practices for enterprises looking to deploy Office 365. In these guidelines, learn how Office 365 was built to be accessed securely and reliably via a direct Internet connection.
Posted: 31 Mar 2017 | Published: 31 Mar 2017

Zscaler

Mobile Security: The 6 Questions Modern Organizations are Asking
sponsored by Lookout
WHITE PAPER: As Gartner says, "It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used." Learn about six vital mobility areas that enterprises are concerned about, including the lack of visibility, protection, vulnerabilities, and more.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

Lookout

Mobile Risks: What's Keeping CISOs up at Night
sponsored by Lookout
WEBCAST: With the rise of BYOD policies, malicious actors crave what unsecure mobile devices can unlock for them, making them a primary enterprise target. Learn what can be done to secure your employees' mobile devices and more.
Posted: 30 Mar 2017 | Premiered: Mar 30, 2017

Lookout

MobileIron and Microsoft's Intune MDM Go Head-to-Head in EMM offering
sponsored by MobileIron
WHITE PAPER: Uncover the key differences between MobileIron and Microsoft's Intune. Learn how to address some of the limitations of both offerings so you can make the best choice to meet mobile security requirements today and down the road.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

MobileIron

The Missing Piece in the GDPR Puzzle
sponsored by Collibra
EBOOK: The clock is ticking. Regulators will issue significant fines for GDPR non-compliance next year. However, with such a massive regulation, where do you begin? Access this resource to uncover how to prepare your organization in the countdown and discover how data governance can help ensure you're GDPR compliant.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

Collibra

Incident Response Tools Can Help Automate Your Security
sponsored by Cisco Umbrella and Dimension Data
EGUIDE: In this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.
Posted: 29 Mar 2017 | Published: 22 Mar 2017

Cisco Umbrella and Dimension Data

7 Elements of Cybersecurity Readiness
sponsored by Cisco Umbrella and Dimension Data
EGUIDE: Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.
Posted: 29 Mar 2017 | Published: 20 Mar 2017

Cisco Umbrella and Dimension Data

Your Guide to Trends in Mobile User Authentication
sponsored by HID
WHITE PAPER: As mobile devices play a greater role in corporate computing and employees become more reliant on them, new security challenges emerge and existing ones become more complex. Access this white paper to discover how the risk of unauthorized access to mobile devices adds new requirements for user authentication.
Posted: 28 Mar 2017 | Published: 24 Mar 2017

HID

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID
WEBCAST: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: Mar 27, 2017

HID

A Network Manager's Guide to Ransomware
sponsored by Cisco Umbrella and Dimension Data
RESOURCE: Learn the most common methods of operation for ransomware and what your organization can do to reduce your vulnerability to it. Also discover handy flowcharts detailing the timelines of web-based and email-based ransomware infections, the components of a strong prevention strategy, and more.
Posted: 27 Mar 2017 | Published: 27 Mar 2017

Cisco Umbrella and Dimension Data

Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID
WEBCAST: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: Mar 27, 2017

HID

Modernizing Your Data Center's Security
sponsored by VMware
WHITE PAPER: The classic approach to data center security is to guard the perimeter and block threats from getting inside—but that's no longer adequate. Learn how micro-segmentation can provide your data center with the security it needs for today's advanced threats.
Posted: 27 Mar 2017 | Published: 30 Sep 2016

VMware

Secure Identity Experience in the Age of Connected Everything
sponsored by HID
WHITE PAPER: Discover how industry expert Christian Christiansen of IDC views security in the age of mobile workforces, smartphone apps, and cloud-based corporate information.
Posted: 24 Mar 2017 | Published: 31 May 2016

HID

Reduce the Number of Ransomware Infections Across Your Organization
sponsored by Cisco Umbrella and Dimension Data
WHITE PAPER: Ransomware is becoming a bigger threat every quarter. Learn what ransomware truly is and how it works, as well as what can be done to mitigate its threat to your organization.
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Cisco Umbrella and Dimension Data

Case Study: Streamlining Security Without Creating Vulnerabilities
sponsored by Cisco Umbrella and Dimension Data
CASE STUDY: Cuts to security in the name of "streamlining" can leave an organization vulnerable. Learn how a large pharmaceutical company made an important change in its security strategy when it started considering cost effectiveness.
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Cisco Umbrella and Dimension Data

Investigating Surprise Attacks at the Application Layer: Bad Bot Report
sponsored by Distil Networks
WHITE PAPER: Bad bots can do everything from maliciously scraping data from sites without permission to undertaking criminal activities, such as fraud and outright theft. Access this report to gain a unique, focused view on bad bot activity at the application layer (layer 7 of the OSI model).
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Distil Networks

Defining Modern Hybrid Security: Enable Cloud-powered Data Protection
sponsored by Amazon Web Services
WHITE PAPER: With the blisteringly fast pace of change in cloud data protection, settling for architecture that doesn't provide what organizations are seeking is a death knell for data security. In this ESG report learn what, how, and why a hybrid cloud architecture could be right for your enterprise's data security needs.
Posted: 23 Mar 2017 | Published: 23 Mar 2017

Amazon Web Services

4 Market Trends Driving Mobile Banking
sponsored by HID
WHITE PAPER: Learn about 4 market trends that are changing the way people are banking and accessing their money, and what this means for the future of mobile banking as well as the security concerns that it raises.
Posted: 23 Mar 2017 | Published: 23 Mar 2017

HID

Your Guide to the 2016 Global Threat Intelligence Report
sponsored by Cisco Umbrella and Dimension Data
WHITE PAPER: Security isn't just beating today's threats: It's a matter of preparing for future threats and mitigating their effects. Dive into this global threat intelligence report and learn how to leverage deep insight into lessons learned from 2016 and 2015, what weaknesses the industry has yet to rectify, what hackers are targeting and where, and more.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Cisco Umbrella and Dimension Data

Top IT Trends in 2017: Cybersecurity
sponsored by Cisco Umbrella and Dimension Data
WHITE PAPER: With so many enterprises making the transition to digital business, the entire landscape of cybersecurity has shifted and morphed dramatically over the past year. This list will delve into 5 top IT trends that will shape 2017 and beyond as it pertains to cybersecurity, the digital transformation, identity, and more.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Cisco Umbrella and Dimension Data

Building an Application Security Program: Why Education is Key
sponsored by tCell
EGUIDE: Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell
76 - 100 of 774 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement