IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
76 - 100 of 287 Matches Previous Page  |  Next Page
The Capabilities of a Successful MSSP
sponsored by AlienVault
WHITE PAPER: This informative guide explores one company's unique MSSP platform and how it can greatly enhance your revenue and your customer's security.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

AlienVault

Discover how to Optimize your SIEM
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security classroom explores how to enhance and extend SIEM technology to effectively support incident response.
Posted: 14 May 2014 | Premiered: 14 May 2014

SearchSecurity.com

Cybersecurity Is Every CIO's Problem
sponsored by SearchCIO.com
EBOOK: This CIO handbook gives you the knowledge you need to create cybersecurity that not only keeps you safe, but also builds trust among consumers and other businesses.
Posted: 07 May 2014 | Published: 07 May 2014

SearchCIO.com

Understanding the Advanced Persistent Threat
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the advanced persistent threats lifecycle and helps you understand the motives behind these attacks, making it easier to prevent them.
Posted: 30 Apr 2014 | Published: 31 Dec 2013

LogRhythm, Inc.

Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

LogRhythm, Inc.

Enterprise Security and your Technology
sponsored by Hewlett-Packard Company
WEBCAST: This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett-Packard Company

Lake Health Enhances Patient Experience with HP ArcSight
sponsored by Hewlett-Packard Company
CASE STUDY: Uncover the SIEM a healthcare provider put in place which helped them take a proactive approach to information security, mitigate anomalies, increase visibility, ensure regulatory compliance, and more!
Posted: 05 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Banca Intesa Counters Threats with HP ArcSight
sponsored by Hewlett-Packard Company
CASE STUDY: Explore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure.
Posted: 30 May 2014 | Published: 29 Mar 2013

Hewlett-Packard Company

TELUS leverages HP ArcSight and TippingPoint
sponsored by Hewlett-Packard Company
CASE STUDY: This informative whitepaper explores how managed security service providers are utilizing effective intelligent analysis for their SIEM solutions.
Posted: 29 May 2014 | Published: 30 Sep 2013

Hewlett-Packard Company

Transforming Information Security: Designing State-of-the-Art Extended Team
sponsored by RSA
WHITE PAPER: This informative whitepaper explores strategies for designing a state-of-the-art security team.
Posted: 29 May 2014 | Published: 31 Dec 2013

RSA

How To Avoid Heartbleed Or Similar SSL Related Vulnerabilities?
sponsored by i-Sprint Innovations
WHITE PAPER: This informative guide explores top strategies for resolving Heartbleed and similar SSL-related vulnerabilities.
Posted: 29 May 2014 | Published: 29 May 2014

i-Sprint Innovations

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Limited
WHITE PAPER: This informative whitepaper explores the role of Big Data and outlines 10 best practices for Big Data security.
Posted: 12 May 2014 | Published: 31 Jan 2014

Hewlett-Packard Limited

Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
sponsored by IBM
WHITE PAPER: This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
Posted: 08 May 2014 | Published: 31 Jan 2014

IBM

4 Secrets to Meaningful Security Discussions with the Board of Directors
sponsored by Citrix
WHITE PAPER: This informative whitepaper outlines 4 helpful hints for meaningful security discussions with your Board of Directors.
Posted: 07 May 2014 | Published: 07 May 2014

Citrix

Navigating Today's DDoS Landscape
sponsored by Ixia
WHITE PAPER: Learn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.
Posted: 02 May 2014 | Published: 02 May 2014

Ixia

Testing the Cloud: Definitions, Requirements, and Solutions
sponsored by Ixia
WHITE PAPER: Testing of cloud services has some familiar aspects and some new challenges. Gain an understanding of the risks in the cloud, and how to safeguard your organization.
Posted: 02 May 2014 | Published: 02 May 2014

Ixia

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

Detecting and Preventing Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: Continue on to this important whitepaper now to learn how to properly instrument and monitor for anomalous activity. Also discover a security intelligence platform that can directly monitor endpoints and much more.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

The Critical Incident Response Maturity Journey
sponsored by RSA
WHITE PAPER: This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
Posted: 16 Apr 2014 | Published: 31 Dec 2013

RSA

The Critical Incident Response Maturity Journey
sponsored by EMC Corporation
WHITE PAPER: This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
Posted: 14 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

From SIEM to Security Analytics: The Path Forward
sponsored by EMC Corporation
WEBCAST: Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

A Roadmap for Big Data in Security Analytics
sponsored by EMC Corporation
WHITE PAPER: Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

EMC Corporation

Transforming Traditional Security Strategies into an Early Warning System for Advanced Threats
sponsored by EMC Corporation
WHITE PAPER: To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Posted: 11 Apr 2014 | Published: 30 Sep 2012

EMC Corporation

The Big Data Security Analytics Era is Here
sponsored by EMC Corporation
WHITE PAPER: Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
Posted: 11 Apr 2014 | Published: 31 Jan 2014

EMC Corporation

Making a Business Case for Fraud Prevention Technology
sponsored by IBM
WHITE PAPER: This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

IBM
76 - 100 of 287 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement