IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Event Management Reports
76 - 100 of 574 Matches Previous Page  |  Next Page
Meaningful Measurement
sponsored by LogicNow
WHITE PAPER: This white paper teaches you how to measure the true impact of cybercrime and mitigate it moving forward. Access now to better understand methods used to commit cyber attacks and what they are costing your organization and organizations around the world.
Posted: 06 Apr 2016 | Published: 01 Mar 2016

LogicNow

Email Phishing: The Impostor in the Machine
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox
Posted: 04 Apr 2016 | Published: 16 Mar 2016

Proofpoint, Inc.

CIS Critical Security Controls - Accelerated & Simplified
sponsored by AlienVault
WHITE PAPER: The CIS Critical Security Controls (CSCs) provide 20 controls that organizations of any size can use to improve their security posture and reduce the risk of cyber threats to critical assets, data, and network infrastructure. This document describes how the AlienVault USM platform maps to each of the CIS CSCs.
Posted: 04 Apr 2016 | Published: 23 Mar 2016

AlienVault

IDS Evaluation Guide
sponsored by AlienVault
WHITE PAPER: This white paper provides a useful reference for evaluating IDS tools. In it, you'll learn the critical components of host and network IDS, giving you real-time threat intelligence to quickly respond to threats.
Posted: 04 Apr 2016 | Published: 01 Mar 2016

AlienVault

The Key to Secure and Seamless Access to Web and Cloud Applications
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
Posted: 01 Apr 2016 | Published: 02 Mar 2016

Radiant Logic, Inc.

The Human Risk Factor Infographic
sponsored by Proofpoint, Inc.
WHITE PAPER: This brief infographic lists the 9 things you need to know about human error exploits today and offers defensive insight to protect your organization and users.
Posted: 01 Apr 2016 | Published: 23 Mar 2016

Proofpoint, Inc.

5 Security Controls for an Effective Security Operations Center (SOC)
sponsored by AlienVault
WHITE PAPER: Whether you're part of a security team or a one-man show, this guide will teach you what data your SOC needs to operate effectively and what methods and tools you can use to gather that data. Download this guide now to accelerate your evaluation of SOC tools and technology needs.
Posted: 01 Apr 2016 | Published: 23 Mar 2016

AlienVault

ICS Survey
sponsored by SurfWatch Labs
WHITE PAPER: This white paper shows the security survey results taken by 314 industry respondents. Access now to learn about organizational breach concerns and how businesses have responded to recent threats.
Posted: 31 Mar 2016 | Published: 30 Jun 2015

SurfWatch Labs

How to Secure Health Records on the Screen
sponsored by OptioLabs
WHITE PAPER: This white paper describes the unique challenges and privacy of data in the healthcare domain where every display represents a potential point of leakage.
Posted: 31 Mar 2016 | Published: 29 Feb 2016

OptioLabs

Solving Data Protection: HGST Active Archive System & Commvault Value of Data Protection at Scale
sponsored by HGST
WHITE PAPER: This white paper shows you how to meet a variety of your organization's demands including software to manage data and a target storage system with the ability to ensure integrity, scale and high availability. Access now to learn how you can simplify your data security.
Posted: 31 Mar 2016 | Published: 01 Jan 2016

HGST

How to Choose the Right Cyber Threat Intelligence Provider
sponsored by SurfWatch Labs
WHITE PAPER: This white paper teaches you what your organization should look for from its threat intelligence software. Learn how to bring cybersecurity in line with your business operations, provide necessary context to prioritize and take meaningful action on specific threats.
Posted: 30 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Defending against POS Malware
sponsored by AlienVault
WHITE PAPER: This white paper takes a look at PoS security and some of the common types of malware used to exploit these systems. Access now to learn about the wide range of hardware and applications, including ubiquitous POS terminals in retail locations.
Posted: 30 Mar 2016 | Published: 01 Feb 2016

AlienVault

Provide a Unified, Coherent Developer Experience using Cloud-based Identification
sponsored by Radiant Logic, Inc.
EGUIDE: This e-guide teaches you about a centralized security tier to enable single sign-on across multiple enterprise, partner and cloud services. Learn how to create a cloud gateway to access applications running across multiple back ends so developers spend less time implementing new security frameworks for each service.
Posted: 29 Mar 2016 | Published: 28 Mar 2016

Radiant Logic, Inc.

Cyber Risk Report - Year in Review
sponsored by SurfWatch Labs
WHITE PAPER: This white paper provides high-level insight on both what cybercriminals are targeting and how they operated over the course of 2015. Learn about the evolving tactics used and how they are impacting business.
Posted: 29 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

The Importance of Threat Intelligence, Visibility and Disrupting the Kill Chain
sponsored by Dell SecureWorks
WHITE PAPER: This white paper shows you a better, more comprehensive approach to endpoint security challenges. Learn how to catch bad network behavior and learn telltale signs that a breach is imminent.
Posted: 28 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Securing the Enterprise - 5 Pragmatic Steps to Security
sponsored by Dell SecureWorks
WHITE PAPER: This white paper presents five major areas of focus for the practical CISO. Build a culture of security across your organization and ensure all employees understand that no one is excluded from responsibility.
Posted: 28 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Q4 Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: This report outlines next-generation security approaches to better fortify mobile enterprise deployments against malicious attacks. Access now to learn about the current mobile threat landscape and learn how you can better protect against new, evolving mobile malware.
Posted: 28 Mar 2016 | Published: 31 Dec 2015

MobileIron

ForeScout CounterACT- Datasheet
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explores ways to continuously monitor network traffic and ways to integrate your networking infrastructure to identify devices as soon as they access the network.
Posted: 28 Mar 2016 | Published: 31 Dec 2015

ForeScout Technologies, Inc.

Norwich School - Case Study
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper describes the network security challenges that Norwich School faced and how they found a solution that met their every need. Access now to learn how you can have increased visibility and save time by easily identifying potential threats before they become a major problem.
Posted: 28 Mar 2016 | Published: 31 Dec 2015

ForeScout Technologies, Inc.

Credit Union Infographic
sponsored by SurfWatch Labs
WHITE PAPER: This white paper shows you exactly why you need cyber threat intelligence to defend your sensitive data. With continuous monitoring technology, you'll learn about breaches the moment they occur and be able to mitigate risk accordingly.
Posted: 28 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

The Major Steps in Creating a Secure Healthcare Network
sponsored by Optum
EGUIDE: Access this e-guide now to learn how to identify, quantify and prioritize risk to create a corrective action plan that can be used to prevent a data breach in your healthcare organization, and keep patient data protected.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

Optum

Healthcare Data Security Threats – And How to Prevent Them
sponsored by Optum
EGUIDE: This e-guide takes a look inside the current state of healthcare IT security, including next-generation patient data security threats and how organizations are adapting their security strategies to protect against data breaches.
Posted: 25 Mar 2016 | Published: 23 Mar 2016

Optum

Building a Business Case for Cyber Threat Intelligence
sponsored by SurfWatch Labs
WHITE PAPER: This white paper gives you 5 main reasons for a risk-based approach to cybersecurity. Access now to learn how you can know the specific cyber threats targeting your business redirect your cyber tactics for the most effective defense and bring cybersecurity into the broader risk discussion.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Next-Generation Endpoint Security Market Sizing and Forecast 2016–2020
sponsored by Carbon Black
WHITE PAPER: This EMA research report provides "beyond the surface" insight on variety of enterprise-capable solution providers. Access this report now and learn about research focused on solution providers providing proactive next-generation endpoint security services covering prevention, detection and response.
Posted: 29 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Overcome the Attacker Advantage with McAfee Endpoint Security 10
sponsored by Intel Security
WHITE PAPER: This white paper shows you how to respond and manage the threat defense lifecycle and a provide collaborative, extensive framework to reduce the complexity of conventional multivendor environments.
Posted: 25 Mar 2016 | Published: 31 Dec 2015

Intel Security
76 - 100 of 574 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement