IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information and Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Information and Event ManagementReports
 
Building momentum: Symantec's new approach to security
sponsored by TechTarget
RESOURCE: Despite its undisputed dominance of the security market, Symantec's revenues have remained static in recent years. Arif Mohamed reports in this eGuide, whether the expansion of its enterprise data security, cloud and mobile portfolio will return it to growth.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Five Steps to Building Visibility and Security Into Your Network
sponsored by Ixia
WHITE PAPER: Discover five steps you need to take to not only build visibility and security into your network, but also get the most out of your current monitoring investments.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Ixia

The Top 20 Critical Security Controls for Effective Cyber Defense
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper outlines how LogRhythm's Security Intelligence Platform maps directly to each of the 20 Critical Security Controls, developed by the SANS Institute to help prioritize the most effective methods and policies to safeguard assets, information, and infrastructure.
Posted: 31 Jul 2014 | Published: 31 Jan 2014

LogRhythm, Inc.

2014 Gartner Magic Quadrant for Web Application Firewalls
sponsored by Imperva
ANALYST REPORT: Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Imperva

Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
sponsored by IBM
WHITE PAPER: This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

How To Avoid Heartbleed Or Similar SSL Related Vulnerabilities?
sponsored by i-Sprint Innovations
WHITE PAPER: This informative guide explores top strategies for resolving Heartbleed and similar SSL-related vulnerabilities.
Posted: 29 May 2014 | Published: 29 May 2014

i-Sprint Innovations

4 Secrets to Meaningful Security Discussions with the Board of Directors
sponsored by Citrix
WHITE PAPER: This informative whitepaper outlines 4 helpful hints for meaningful security discussions with your Board of Directors.
Posted: 07 May 2014 | Published: 07 May 2014

Citrix

Select the Right Solution for Endpoint Management
sponsored by IBM
WHITE PAPER: This guide explores how you can improve your overall security with endpoint management – ensuring greater visibility with a more unified approach.
Posted: 03 Feb 2014 | Published: 31 May 2013

IBM

Overview: Comprehensive Security Intelligence Platform
sponsored by IBM
WHITE PAPER: Security management is a top priority of every IT department, but unfortunately these processes are growing more and more complex each day. This guide explores the importance of comprehensive security strategies and how it can smooth businesses processes while ensuring a secure system.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

IBM

Information Security ANZ March 2014
sponsored by SearchSecurity.com
EZINE: This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement