IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information and Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Information and Event ManagementReports
 
Beyond Shadow IT: A Proactive Approach to Reducing Risk While Embracing Cloud Services
sponsored by SkyHigh
WHITE PAPER: This exclusive whitepaper will teach you how to address shadow IT to ensure a stable, secure cloud environment.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

SkyHigh

Scaling Analytics to Meet Real-Time Threats in Large Enterprises
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper summarizes a comprehensive validation lab test recently performed by the SANS Institute on LogRhythm's security analytics platform.
Posted: 31 Jul 2014 | Published: 30 Sep 2013

LogRhythm, Inc.

SIEM Optimization: Ensuring Compliance and Security
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: This video is an in-depth, indexed demonstration of LogRhythm's award-winning SIEM 2.0 Security Intelligence Platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

Security Analytics and Intelligence Survey 2014
sponsored by Hewlett-Packard Company
WHITE PAPER: This survey of 350 IT professionals explores how IT security teams use security analytics and intelligence to help detect cyber attacks.
Posted: 12 Nov 2014 | Published: 15 Oct 2014

Hewlett-Packard Company

Protecting your Executives and Important Information from Risk
sponsored by Gemalto
WHITE PAPER: Check out this exclusive whitepaper for an overview of protecting executive-level information and uncover some ways to simplify management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

SIEM Missteps? Tips to Help You Move Forward
sponsored by LogRhythm, Inc.
PODCAST: Download this expert podcast now to learn about key pitfalls you must avoid to find value in your security information and event management deployment at different maturity levels.
Posted: 02 Dec 2014 | Premiered: Nov 13, 2014

LogRhythm, Inc.

Managing Security Risks and Vulnerabilities
sponsored by Avnet
WHITE PAPER: Access this valuable white paper now to learn how to protect high-value assets and provide scalable, cost-effective, integrated security across the entire IT environment and much more.
Posted: 22 Dec 2014 | Published: 08 Jan 2014

Avnet

Security Information and Event Management Solutions
sponsored by TechTarget
RESOURCE: Choosing a SIEM solution can be a daunting task with so many options to consider. To help make your decision easier, IT Central Station has compiled this overview of the leading SIEM solutions along with reviews from your fellow IT Professionals. Find out what solution best fits your needs with this comprehensive guide.
Posted: 24 Oct 2014 | Published: 09 Sep 2014

TechTarget

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Lake Health Enhances Patient Experience with HP ArcSight
sponsored by Hewlett-Packard Company
CASE STUDY: Uncover the SIEM a healthcare provider put in place which helped them take a proactive approach to information security, mitigate anomalies, increase visibility, ensure regulatory compliance, and more!
Posted: 05 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement