IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Information Management Reports
 
Infographic: 2014 Honeypot findings across US, Europe and Asia
sponsored by Alert Logic
RESOURCE: Access this brief infographic to find out the types and frequencies of attacks and how they vary globally. View now to learn more.
Posted: 18 Mar 2015 | Published: 04 Dec 2014

Alert Logic

The Top 20 Critical Security Controls for Effective Cyber Defense
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper outlines how LogRhythm's Security Intelligence Platform maps directly to each of the 20 Critical Security Controls, developed by the SANS Institute to help prioritize the most effective methods and policies to safeguard assets, information, and infrastructure.
Posted: 31 Jul 2014 | Published: 31 Jan 2014

LogRhythm, Inc.

Keep Your Network Secure with Threat Intelligence and SIEM
sponsored by Threatstream
EGUIDE: In this expert e-guide, discover how to integrate threat intelligence with SIEM for optimal network security.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Threatstream

Understanding the Data Security Risk – New Findings Revealed
sponsored by IBM
WHITE PAPER: In this webcast, discover how to defend the 4 types of data hackers want to steal using a simple framework as a foundation for your security strategy. View now to learn more.
Posted: 11 Mar 2015 | Published: 04 Feb 2015

IBM

Shellshock: Best practices for responding to the next vulnerability or Six best practices for successful vulnerability response
sponsored by Alert Logic
WHITE PAPER: In this white paper, uncover the six steps to effective vulnerability response and how to craft your defensive strategy.
Posted: 17 Mar 2015 | Published: 04 Feb 2015

Alert Logic

Gartner - Top Security Trends Takeaways for 2013-14 Webinar Slides
sponsored by Dropbox for Business
WHITE PAPER: These slides outline the state of information security and what you need to know to stay protected.  Read on to uncover insider tips for mitigating risks in the several computing environments.
Posted: 30 Mar 2015 | Published: 29 Aug 2013

Dropbox for Business

Under Threat or Compromise Every Detail Counts
sponsored by Blue Coat Systems
WHITE PAPER: This white paper breaks down the five essential steps of security management to help you create a more comprehensive defense suited for today's threat landscape.
Posted: 08 Apr 2015 | Published: 31 Aug 2014

Blue Coat Systems

Best Practices for Incident Detection and Response
sponsored by SurfWatch Labs
WEBCAST: This webcast teaches you how to get the most from your threat intelligence by presenting the best practices for incident detection and response.
Posted: 30 Mar 2015 | Premiered: Feb 20, 2015

SurfWatch Labs

Protecting Corporate Credentials Against Today’s Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores the traditional method of protecting corporate credentials and how you must adapt to today's threat landscape.
Posted: 24 Nov 2014 | Published: 16 Sep 2014

IBM

The pros and cons of SSL decryption for enterprise network monitoring
sponsored by GeoTrust, Inc.
EGUIDE: Access this eGuide to hear from network security guru Brad Casey about the pros and cons of using SSL decryption for enterprise network monitoring. Read on to learn how this technique can bolster your network security, and answer your questions about SSL decryption.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

GeoTrust, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement