IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information and Event Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Information and Event ManagementReports
 
10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: This exclusive whitepaper offers up 10 tips for improving your incident response capabilities.
Posted: 14 Nov 2014 | Published: 14 Nov 2013

Dell SecureWorks

What is the impact to businesses when their web infrastructure is attacked?
sponsored by Akamai Technologies
VIDEO: Edward S Ferrara, Vice President & Principal Analyst at Forrester delves into the direct and indirect costs of attacks. To prepare yourself for attacks, download and view this video as a resource to refer to later when arming yourself against hackers.
Posted: 07 Nov 2014 | Premiered: 03 Nov 2014

Akamai Technologies

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by IBM
WHITE PAPER: This highly informative white paper from Gartner objectively evaluates a variety of SIEM technologies on a number of critical dimensions, including market responsiveness, customer experience, and pricing.
Posted: 24 Jul 2014 | Published: 25 Jun 2014

IBM

The Internet of Things: A CISO and Network Security Perspective
sponsored by Cisco
WHITE PAPER: This exclusive whitepaper dives head first into the realities of the Internet of Things, including the security considerations that go along with it.
Posted: 24 Nov 2014 | Published: 14 Oct 2014

Cisco

Demo: RSA ECAT
sponsored by RSA
VIDEO: Watch this demo to see what real-time malware analysis on the endpoint looks like with RSA ECAT.
Posted: 28 Oct 2014 | Premiered: 28 Oct 2014

RSA

The Top 20 Critical Security Controls for Effective Cyber Defense
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper outlines how LogRhythm's Security Intelligence Platform maps directly to each of the 20 Critical Security Controls, developed by the SANS Institute to help prioritize the most effective methods and policies to safeguard assets, information, and infrastructure.
Posted: 31 Jul 2014 | Published: 31 Jan 2014

LogRhythm, Inc.

Benefits of Threat Intelligence
sponsored by IBM
EGUIDE: This expert e-guide explores new technology that technology integrates threat intelligence and evaluates it against known system vulnerabilities for better prioritization of security controls.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

IBM

DDoS and Downtime Considerations for Risk Management
sponsored by Verisign, Inc.
WHITE PAPER: This exclusive whitepaper explores your risk management options when it comes to distributed denial of service attacks.
Posted: 27 Oct 2014 | Published: 11 Oct 2012

Verisign, Inc.

Mitigating Risks of Cloud Computing with SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines an overview of cloud computing, highlighting its advantages as well as its concerns.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

Deliver Secure New Business Services
sponsored by CA Technologies.
WHITE PAPER: This informative guide explores how you can deliver secure business services and improve customer experience.
Posted: 23 Jun 2014 | Published: 31 Dec 2013

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement