IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Information Management Reports
 
Survey Results: The Value of a SIEM Platform
sponsored by IBM
WHITE PAPER: This report presents an in-depth review on one SIEM platform based survey responses provided by independent IT professionals.
Posted: 05 Jun 2015 | Published: 28 Feb 2014

IBM

Three-Pronged Approach to Improving Physical Security
sponsored by Modulo
WHITE PAPER: View this white paper to discover how to improve the physical protection of data through a three-pronged approach and how people, processes, and technologies can be used to minimize the disruption of information losses. Access now to learn more.
Posted: 02 Apr 2015 | Published: 04 Feb 2015

Modulo

Information Security Magazine – The Hunt for Data Analytics
sponsored by SearchSecurity.com
EZINE: Big data and analytics show promise for better threat detection. Should these technologies be combined with SIEM products, or is it time to move beyond these high alert systems?
Posted: 02 Mar 2015 | Published: 02 Mar 2015

SearchSecurity.com

Security in a Dangerous Time: Top Priorities for 2015
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper shares the top 5 security priorities gathered from a recent IDG survey. Continue reading to learn more
Posted: 11 Jun 2015 | Published: 08 Apr 2015

Fortinet, Inc.

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper to learn about another perspective in POS system security. Read on for an overview of payment card systems and attack methods, as well as how to leverage the Council on CyberSecurity's 20 critical controls to your system's advantage.
Posted: 13 Apr 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

The Case for Cloud-Based Security Intelligence
sponsored by IBM
WHITE PAPER: This whitepaper examines how cloud-based security intelligence can improve security without incurring additional costs or management needs.
Posted: 04 Jun 2015 | Published: 30 Apr 2015

IBM

What is the right Web Application Assessment for you
sponsored by Hewlett-Packard Company
EGUIDE: This expert e-guide examines the pros and cons of several low cost web app security testing tools and offers insight into choosing the right one for the job. Continue reading to learn if a security assessment termed "compliance ready" is too good to be true.
Posted: 22 May 2015 | Published: 13 May 2015

Hewlett-Packard Company

The Business Value of a Comprehensive All-in-OneData Protection Solution for Your Organization
sponsored by Asigra
WHITE PAPER: Access this white paper to learn how to develop a comprehensive data protection strategy to have transparent visibility and complete control. View now to explore the five common failures of data protection and how to overcome each.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Asigra

How to Use Threat Intelligence with SIEM Products
sponsored by LogRhythm, Inc.
EGUIDE: This expert e-guide will teach you how to use security information and event management to protect your organization from evolving threats.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

LogRhythm, Inc.

How to Properly Plan Against Attacks with Incident Response and Advanced Malware Protection
sponsored by TaaSera
EGUIDE: This expert e-guide explores the dos and don'ts of creating an incident response plan and looks at how advanced malware uses your own network against you.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

TaaSera
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement