All resources sponsored by:

Splunk

1 - 25 of 119 Matches
The 5 Essential Capabilities of an Analytics-Driven SOC
sponsored by Splunk
RESOURCE:When IT and business leaders lack visibility into their organization's true level of risk vulnerability, they could be getting exploited at this moment – and not even know about it. Uncover how a modern SOC can improve your security posture with threat intelligence and analytics.
Posted: 29 Jun 2018 | Published: 29 Jun 2018
Get This Now


A Short Primer of GDPR Essentials
sponsored by Splunk
RESOURCE:Don't allow new GDPR regulations to spring fines on your business. Download this resource to access a primer of information regarding GDPR, including financial implications, key focus areas, and more.
Posted: 29 Jun 2018 | Published: 29 Jun 2018
Get This Now


Four Easy Ways Central Logging Improves Security Posture
sponsored by Splunk
WHITE PAPER:What's happening in your security environment? Get the complete picture.
Posted: 29 Jun 2018 | Published: 29 Jun 2018
Get This Now


A Guide to Fraud in the Real World
sponsored by Splunk
WHITE PAPER:Even for enterprises, fraud is a real burden and risk, which Verizon's DBIR says is costing you. Download this white paper to uncover 6 real-world scenarios that show the benefits of using machine learning to stay ahead of fraud.
Posted: 29 Jun 2018 | Published: 29 Jun 2018
Get This Now


Why You Should Take Security in the Cloud
sponsored by Splunk
WHITE PAPER:This white paper highlights the benefits of running a security analytics platform in the cloud and explores the power of big data analytics and cloud-based security.
Posted: 29 Jun 2018 | Published: 29 Dec 2017
Get This Now


A Layman's Guide on How to Operate Your SIEM Under GDPR
sponsored by Splunk
RESOURCE:GDPR is now in effect – and your business needs to think about how that affects the machine data you're collecting. Explore the risks of a log file data breaches, and discover how a SIEM platform can help your business mitigate risk around log files.
Posted: 28 Jun 2018 | Published: 31 Dec 2017
Get This Now


The SIEM Buyer's Guide: The Who, What, Where, When and Why of Buying an Analytics-Driven Security Solution
sponsored by Splunk
RESOURCE:In this buyer's guide, learn what a SIEM solution is, what it isn't, it's evolution, what it does and how to determine if it is the right security solution for your organization.
Posted: 28 Jun 2018 | Published: 28 Jun 2018
Get This Now


Splunk Security Use Case Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER:In this white paper, explore a step-by-step journey on how to detect unknown malware activity and early signs of compromise in a Windows environment and find out how security analysts can gain a significant understanding of detailed activities on endpoint.
Posted: 28 Jun 2018 | Published: 28 Jun 2018
Get This Now


Reducing Complexity in IT Infrastructure Monitoring: Study of Global Organizations
sponsored by Splunk
WHITE PAPER:Most IT professionals are responsible for monitoring and managing an average of 59 servers. Yikes. Based on a survey of over 2,500 IT decision makers around the world, find out how these leaders are addressing visibility and monitoring challenges in the wake of increasing infrastructure complexity.
Posted: 28 Jun 2018 | Published: 30 Apr 2018
Get This Now


Clear Up Your Event Storms With Event Analytics
sponsored by Splunk
WHITE PAPER:As IT environments are becoming increasingly intricate, event monitoring is becoming more and more labor intensive. Click to learn how event analytics powered by machine learning can recognize abnormalities in your infrastructure's performance and take proactive steps towards resolution, freeing up IT to focus on strategic tasks.
Posted: 28 Jun 2018 | Published: 28 Jun 2018
Get This Now


Ransomware 101: Three Key Ways to Start Combating Ransomware
sponsored by Splunk
WHITE PAPER:You may ask yourself "how do I defend myself or my organization against ransomware?" and "where do I start?" There are 3 key ways you can combat the rising issue of ransomware. Find out how.
Posted: 27 Jun 2018 | Published: 27 Jun 2018
Get This Now


The Importance of Hybrid Monitoring and Visibility
sponsored by Splunk
WHITE PAPER:Monitoring and managing all the disparate components of hybrid architecture is far from simple. Continue reading to find out why having end-to-end monitoring and visibility into your hybrid operations is vital to your enterprise's longevity.
Posted: 27 Jun 2018 | Published: 31 Dec 2017
Get This Now


Market Guide for AIOps Platforms
sponsored by Splunk
WHITE PAPER:It's no secret that big data and machine learning functionalities present major opportunity for enterprises. In this Gartner Market Guide, discover the short-term and long-term implications that an AIOps based strategy that takes advantage of intelligent technology can have on an enterprise's I&O performance, service desk, and more.
Posted: 27 Jun 2018 | Published: 31 Aug 2017
Get This Now


Insights Everywhere — Gaining More Value From Cloud and Hybrid
sponsored by Splunk
CASE STUDY:Explore these 3 case studies to see how businesses turned to Splunk to derive actionable insights from hybrid environments, with benefits in areas including DevOps and security.
Posted: 26 Jun 2018 | Published: 31 Dec 2017
Get This Now


How Machine Data Supports GDPR Compliance
sponsored by Splunk
WHITE PAPER:Discover 3 machine data use cases that can help support your GDPR compliance program, regardless of the nature of your industry or deployment model – whether it's on-premise, in the cloud, or hybrid.
Posted: 26 Jun 2018 | Published: 31 Dec 2017
Get This Now


Investigation or Exasperation?
sponsored by Splunk
RESEARCH CONTENT:This IDC State of Security Operations Report reveals insights from 600 organizations on the current readiness of security, where organizations are focusing their security efforts, and what is driving the need for security. Find out how organizations are handling attacks, and how many are unprepared.
Posted: 14 Jun 2018 | Published: 31 Mar 2017
Get This Now


New Criteria for Today's SIEM
sponsored by Splunk
WHITE PAPER:This white paper explores key capabilities to consider when evaluating a new SIEM – or re-evaluating a legacy SIEM against today's requirements.
Posted: 14 Jun 2018 | Published: 14 Jun 2018
Get This Now


A Guide to Fraud in the Real World
sponsored by Splunk
WHITE PAPER:Fraud is a growing problem in the U.S. and is expected to grow 10% more each year, according to Splunk. This white paper presents various real life scenarios of fraud challenges being faced by Duke University and others.
Posted: 13 Jun 2018 | Published: 13 Jun 2018
Get This Now


Operationalizing Threat Intelligence Using Splunk Enterprise Security
sponsored by Splunk
WHITE PAPER:Gather insights on the challenges and requirements of implementing high-coverage threat intelligence.
Posted: 13 Jun 2018 | Published: 31 Dec 2017
Get This Now


Splunk Enterprise Security
sponsored by Splunk
RESOURCE:Tap into insights offered by this white paper on analytics-driven security and how to continuously monitor modern threats.
Posted: 12 Jun 2018 | Published: 12 Jun 2018
Get This Now


Turning Data Into Answers: A Collection of Security Customer Stories
sponsored by Splunk
WHITE PAPER:Incident investigation and remediation can be reduced from hours to minutes for enhanced security posture. Through the examples of 15 case studies -- Duke University, Ohio Health, Discover Communications and others-- learn where data was harnessed throughout disparate systems to benefit the core operations and security of the organizations.
Posted: 24 May 2018 | Published: 24 May 2018
Get This Now


The Five Essential Capabilities of an Analytics-Driven SOC
sponsored by Splunk
WHITE PAPER:Organizations are now looking to analytics-driven security operations centers (SOCs) to close the gaps in their network defenses. In this white paper, uncover how a successful SOC should have 5 key attributes.
Posted: 23 May 2018 | Published: 23 May 2018
Get This Now


How to Improve your Security Posture
sponsored by Splunk
WHITE PAPER:In this white paper, you will learn the 3 SIEM trends that call for a big data SIEM approach as well as the limitations of traditional SIEM strategies.
Posted: 23 May 2018 | Published: 23 May 2018
Get This Now


Comparing Security Information and Event Management Providers
sponsored by Splunk
RESEARCH CONTENT:With so many vendors on the market offering SIEM services that differ in subtle ways, how do you know which one is right for you? This Gartner Report seeks to answer that question by listing the pros and cons of 19 SIEM offerings so you can make your own informed choice.
Posted: 23 May 2018 | Published: 04 Dec 2017
Get This Now


The SIEM Buyer's Guide
sponsored by Splunk
WHITE PAPER:How have SIEM platforms evolved? This SIEM Buyer's Guide reveals the differences between modern SIEM and legacy SIEM and offers 9 technical capabilities of a modern SIEM strategy and how it can improve your overall security.
Posted: 23 May 2018 | Published: 23 May 2018
Get This Now


1 - 25 of 119 Matches
Page: 2 3 4 5 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement