IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Information Management Reports
 
Cost of a Data Breach Calculator
sponsored by IBM
RESOURCE: This short survey helps you identify your organization's risk profile, which includes your organization's risk of experiencing a data breach, the average cost per compromised record and the total cost of a data breach to your organization.
Posted: 25 Jul 2016 | Published: 01 Jun 2016

IBM

Uncovering the Risk of SAP Cyber Breaches
sponsored by Onapsis
WHITE PAPER: The purpose of this Ponemon Institue study is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

Onapsis

Strategy Guide for Securing the SAP Landscape
sponsored by Onapsis
WHITE PAPER: Your organization should be thinking about how best to protect SAP systems. Learn how to secure SAP by taking a largely application-oriented approach, while also applying network restrictions to underlying network devices and firewalls.
Posted: 24 Aug 2016 | Published: 01 Jun 2016

Onapsis

Cyber Security Awareness with PolicyTech
sponsored by Navex Global
VIDEO: Learn how to save time and money in training employees while ensuring your organization meets legal and regulatory requirements. Access now to discover more about why distributing your security policy has never been easier.
Posted: 29 Jul 2016 | Premiered: 01 Jun 2016

Navex Global

Securosis: Securing Hadoop: Security Recommendations for Hadoop Environments
sponsored by Vormetric
ANALYST REPORT: This research paper lays out a series of recommended security controls for Hadoop, along with the rationale for each. The analysis is based upon conversations with dozens of data scientists, developers, IT staff, project managers, and security folks from companies of all sizes; as well as decades of security experience the Securosis team brings.
Posted: 28 Jul 2016 | Published: 01 Jun 2016

Vormetric

Info-Tech Research Group 2015 SIEM Vendor Landscape Report
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover the effectiveness and simplicity SIEM can bring to threat managmenet for your organization. By integrating with other security technologies, the SIEM solution can act as a single window into the threats and possible breaches that your organization is facing. Learn how to get greater visibility into otherwise hidden threats.
Posted: 22 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

Making the Case for Application Security Testing on Cloud
sponsored by IBM
WEBCAST: It presents to you the pros and cons of application security testing and penetration testing techniques. Discover how you can combat application security threats conveniently and effectively in the cloud.
Posted: 24 Aug 2016 | Premiered: Oct 20, 2015

IBM

Deep Security Protection from Ransomware
sponsored by TrendMicro
WHITE PAPER: Ransomware is increasingly targeting servers, where attackers use known software vulnerabilities to inject ransomware. Learn how to protect your servers from ransomware attacks through anti-malware, intrusion prevention, integrity monitoring and web reputation.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

TrendMicro

Day in the Life of a Security Admin
sponsored by RSA Softcat
WHITE PAPER: Luckily for your CISO, it's now easier than ever to allow users full access to all network tools and data with a single username and password combination. Learn how to set precise security requirements directed by the CISO for each application for any user, from anywhere, to anything.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Protecting Mission-Critical Source Code from Application Security Vulnerabilities
sponsored by IBM
WEBCAST: In this webcast, you'll learn how to test application source code for potential security vulnerabilities, so you can confidently release your organization's applications.
Posted: 24 Aug 2016 | Premiered: Jul 1, 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement