IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

Security Managers

RSS Feed    Add to Google    Add to My Yahoo!
Security ManagersReports
26 - 50 of 709 Matches Previous Page  | Next Page
Identity Analytics: Exposing the "Who" in Anonymous Log and Machine Data
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper discusses LogRhythm's Identity Inference Engine™, which combines already-collected machine data with advanced analytics to automatically identify who is responsible for activities in your IT environment, a critical component of maintaining a secure network.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

LogRhythm Labs Embedded Expertise
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm Labs, an organization within LogRhythm that performs dedicated research to continually enhance the Security Intelligence Platform with embedded machine data intelligence, real-time threat detection, and automated compliance assurance.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Scaling Analytics to Meet Real-Time Threats in Large Enterprises
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper summarizes a comprehensive validation lab test recently performed by the SANS Institute on LogRhythm's security analytics platform.
Posted: 31 Jul 2014 | Published: 30 Sep 2013

LogRhythm, Inc.

How Privileged Account Security Can Significantly Reduce Risk, Stop Attackers & Prevent Data Exfiltration
sponsored by Cyber-Ark Software
WHITE PAPER: This white paper examines the best practices for minimizing the security risks that privileged accounts can create, and provides the essential strategic takeaways that can start protecting your organization now.
Posted: 30 Jul 2014 | Published: 31 May 2014

Cyber-Ark Software

Are you using the right tablet device?
sponsored by ComputerWeekly.com
RESOURCE: Is your tablet device the right tablet device for your business? Participate in our Web Security Research Program to find out. Upon completion of the survey, you will get immediate access to Computer Weekly Buyer's Guide to Business Tablets, where CW reveals the ins-and-outs of the tablet devices on the market.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

ComputerWeekly.com

How Managed Endpoint Security Can Help Expand Your Managed Services Business
sponsored by N-able Technologies
WHITE PAPER: In this white paper, learn how utilizing a single integrated management platform for malware protection can help Managed Service Providers (MSPs) streamline and standardize their security efforts, and the many benefits of implementing managed endpoint security for MSPs and their customers.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

N-able Technologies

What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

IBM

Buyer's Guide: SIEM Appliances for 2014-2015
sponsored by LogRhythm, Inc.
WHITE PAPER: Many smaller organizations still face an uphill battle in understanding and sorting through the SIEM vendor options available to them and then choosing the right product for them. This Buyer's Guide lets IT organizations immediately understand what features and functions are available so they can move more quickly to making a buying decision.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Introducing LogRhythm v6.2
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm vg.2, which offers security professionals a powerful monitoring and auditing platform to keep them informed, and excellent investigatory tool in case things go wrong.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

SIEM Tools to Optimize IT Security Management and Simplify Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: Check out this vendor landscape report to see how the top 10 SIEM vendors compare and contrast.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by LogRhythm, Inc.
WHITE PAPER: Check out this Magic Quadrant report for security information and event management to see how leading vendors compare and contrast.
Posted: 29 Jul 2014 | Published: 25 Jun 2014

LogRhythm, Inc.

A Multilayered Defense Approach to Protect Your Organization's Data
sponsored by Symantec Corporation
WHITE PAPER: This white paper details the types of attacks that enterprises commonly face, and it introduces a multilayered solution that could be a valuable investment for your organization in the face of these threats.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

Symantec Corporation

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: This white paper introduces a security solution that applies big data capabilities to help organizations to keep pace with today's advanced threats and prevent attacks before they happen.
Posted: 28 Jul 2014 | Published: 31 Jan 2013

IBM

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by IBM
WHITE PAPER: This highly informative white paper from Gartner objectively evaluates a variety of SIEM technologies on a number of critical dimensions, including market responsiveness, customer experience, and pricing.
Posted: 28 Jul 2014 | Published: 25 Jun 2014

IBM

Web Application Firewalls vs. Next-Generation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper compares the ability of two different types of firewalls—Web Application Firewalls (WAFs) and Next-Generation Firewalls (NGFWs)—to protect web applications from security threats.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

Fortinet, Inc.

Firms Turn To Next-Generation Firewalls To Tackle Evolving IT Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper summarizes a number of insights on current security challenges for enterprises and the ways that next-generation firewalls (NGFWs) are being applied as a solution.
Posted: 28 Jul 2014 | Published: 30 Apr 2014

Fortinet, Inc.

Security & Risk Management Summit 2014
sponsored by Gartner
BROCHURE: Today's increasingly complex IT landscape demands that security and risk management professionals come together to create security strategies that deliver significant value to the business. Learn how to do just that at a 2014 Security & Risk Management Summit in London, UK on September 8-9
Posted: 25 Jul 2014 | Published: 25 Jul 2014

Gartner

New Software Solution provides Real-Time Threat Detection and Visibility from Day 1
sponsored by AlienVault
SOFTWARE DOWNLOAD: This resource contains a free 30-day trial of an innovative new Unified Security Management platform, designed and priced to aid mid-market organizations in obtaining complete security visibility and advanced threat intelligence.
Posted: 24 Jul 2014 | Premiered: 24 Jul 2014

AlienVault

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by IBM
WHITE PAPER: This highly informative white paper from Gartner objectively evaluates a variety of SIEM technologies on a number of critical dimensions, including market responsiveness, customer experience, and pricing.
Posted: 24 Jul 2014 | Published: 25 Jun 2014

IBM

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Practical Solutions for Threat Management and Incident Response
sponsored by AlienVault
WEBCAST: This helpful webcast discusses a multitude of critical issues related to threat management in small and medium-sized enterprises.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault

Protecting Organizations Against Advanced Persistent Threats
sponsored by CDW Corporation
VIDEO: This helpful video provides an overview of advanced persistent threats (APTs) and identifies several best practices that organizations should keep in mind to identify vulnerabilities and enforce stronger security policies.
Posted: 22 Jul 2014 | Premiered: 21 May 2014

CDW Corporation

Combatting APTs with a Defense-in-Depth Security Approach
sponsored by CDW Corporation
WHITE PAPER: This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Posted: 22 Jul 2014 | Published: 05 Mar 2014

CDW Corporation

Live Demo: How to Detect a Cryptolocker Infection
sponsored by AlienVault
WEBCAST: This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault
26 - 50 of 709 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement