IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Information Management Reports
 
Leading Department Store Discounts Traditional AV and Purchases Bit9 to Protect Against Advanced Threats and Targeted Attacks
sponsored by Bit9 + Carbon Black
WHITE PAPER: This valuable case study reveals the security platform one regional retailer chose to better protect themselves after national chains were attacked by advanced threats.
Posted: 14 Jan 2015 | Published: 15 Jan 2014

Bit9 + Carbon Black

Streamline Windows 7 Migration with this Endpoint Manager
sponsored by IBM
WHITE PAPER: Check out this valuable whitepaper now to learn about an endpoint management solution that can consolidate your systems management infrastructure, automate your processes, clear out inefficiencies, and much more.
Posted: 11 Nov 2014 | Published: 11 Jul 2014

IBM

Scaling Analytics to Meet Real-Time Threats in Large Enterprises
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper summarizes a comprehensive validation lab test recently performed by the SANS Institute on LogRhythm's security analytics platform.
Posted: 31 Jul 2014 | Published: 30 Sep 2013

LogRhythm, Inc.

Magic Quadrant for Endpoint Protection Platforms
sponsored by Symantec Corporation
WHITE PAPER: This exclusive white paper compares 18 leading endpoint security solutions.
Posted: 22 Jan 2015 | Published: 22 Dec 2014

Symantec Corporation

The Problem with Your Threat Intelligence
sponsored by Risk IO
WHITE PAPER: This exclusive white paper explores some common security intelligence mistakes you might be making.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Risk IO

Securosis Analyst Report: Is It Time to Replace Your Current SIEM Solution?
sponsored by IBM
WHITE PAPER: In this in-depth white paper, gain critical insights into how to evaluate, select, and deploy the right SIEM solution for your organization's specific needs.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

Protecting Your Business with a More Mature IT Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: Your ability to spot and stop cyber attacks depends on having the right security people, processes, and technology in place. HP Security Intelligence and Operations Consulting has assessed the security programs of dozens of enterprises. The results are concerning--24 percent of companies do not meet minimum requirements for security monitoring.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

Hewlett-Packard Company

Vendor vs. Vendor: Security Information and Event Management Solutions
sponsored by IT Central Station
ESSENTIAL GUIDE: Choosing a SIEM solution can be a daunting task with so many options to consider. To help make your decision easier, IT Central Station has compiled this overview of the leading SIEM solutions along with reviews from your fellow IT Professionals. Find out what solution best fits your needs with this comprehensive guide.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Deliver Secure New Business Services
sponsored by CA Technologies.
WHITE PAPER: This informative guide explores how you can deliver secure business services and improve customer experience.
Posted: 23 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Closing the Biggest Hole in Web Application Delivery
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper explores a strategy for closing the biggest hole in web application delivery.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement