SIM White Papers

(View All Report Types)
The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Technical Guide on SIM
sponsored by TechTarget Security
EGUIDE: Security information and event management solutions are an indispensible technology in IT security programs to help solidify data protection and compliance initiatives. In this comprehensive guide to SIM, our experts provide authoritative technical advice to help ensure effective SIM deployments and proper on-going maintenance.
Posted: 16 Aug 2011 | Published: 16 Aug 2011

TechTarget Security

SIM Technical Guide
sponsored by TechTarget Security
EZINE: In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.
Posted: 08 Mar 2013 | Published: 08 Mar 2013

TechTarget Security

Essential Guide to SIMs Strategy
sponsored by Information Security Magazine
EGUIDE: Take an incremental approach to security information and event management. Start slow, narrow your goals and be patient with these expensive and complex tools, otherwise data overload will bring you down. Read this guide to find out so much more.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Information Security Magazine

IT Decision Checklist: SIMs and Log Management
sponsored by LogLogic, Inc.
EGUIDE: In this paper, you'll learn that Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We'll outline what you should look for to get the most relevant data from SIMs.
Posted: 05 Jan 2010 | Published: 05 Jan 2010

LogLogic, Inc.

E-Guide: Uniting SIM and IAM to Boost Security
sponsored by TechTarget Security
EGUIDE: When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

TechTarget Security

E-Guide: Bringing Value to Application Monitoring Through SIM
sponsored by TechTarget Security
EGUIDE: This expert e-guide describes the value that security information and management systems (SIMs) can bring to both application monitoring and real-time security. See how you can get the most out of SIM by reading on now.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

TechTarget Security

E-Guide: IT Decision Checklist: SIMs and Log Management
sponsored by Tripwire, Inc.
EGUIDE: Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We’ll outline what you should look for to get the most relevant data from SIMs. Read this paper to find out more.
Posted: 30 Apr 2010 | Published: 30 Apr 2010

Tripwire, Inc.

E-Guide: Selecting a SIM for midmarket business
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses the evolvement of SIM tools, differences in deployment processes and top requirements you should consider before making a decision.
Posted: 01 Nov 2011 | Published: 31 Oct 2011

TechTarget Security

Technical Guide on SIM: Moving beyond network security toward protecting applications
sponsored by TechTarget Security
EGUIDE: SIMs have been widely adopted for their value in correlating, reporting and alerting on network security. But SIMs can be used for more than just network security monitoring. The same tools can also bring value to application managers if used correctly. In this technical guide, gain 4 steps for integrating applications into enterprise SIMs.
Posted: 01 Jan 2012 | Published: 20 Dec 2011

TechTarget Security

Security Information Management Systems Aspire to Real-Time Security
sponsored by Hewlett Packard Enterprise
EGUIDE: Explore security information management (SIM) systems' capabilities for real-time security, learn why the definition of "real-time" may need altering, and uncover the factors preventing SIMs from attaining real-time status.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

Hewlett Packard Enterprise

Improving regulatory compliance management through log analysis, SIM
sponsored by HP Enterprise Security
EGUIDE: This E-Guide highlights the importance of log analysis and security information and event management (SIEM) in improving regulatory compliance management.
Posted: 30 Mar 2012 | Published: 30 Mar 2012

HP Enterprise Security

Honeywell Food Retail Eco-Efficiency Sim Model 1
sponsored by Honeywell
VIDEO: Watch this video, designed for food retailers, to demystify the refrigeration technology purchasing process and to view Honeywell’s eco-efficiency simulation model that assists retailers in making their shortlist.
Posted: 11 Apr 2024 | Premiered: 11 Apr 2024

TOPICS:  .NET
Honeywell

Security Information Management Systems and Application Monitoring
sponsored by TechTarget Security
EGUIDE: Did you know your security information management (SIM) system can shed light on application performance issues? This E-Guide details a four-step process for integrating apps into your SIM. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

TechTarget Security

Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
sponsored by Information Security Magazine
EZINE: This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
Posted: 10 Jun 2009 | Published: 10 Jun 2009

Information Security Magazine

IT Decision Checklist: Security Information and Event Management
sponsored by HP Enterprise Security
EZINE: As the complexity of the networks IT manages continues to increase, so too does the volume of security-related information generated by network devices. This exclusive e-zine explores the business and technical considerations in selecting the security information management (SIM) tools you need to maintain control.
Posted: 24 Feb 2012 | Published: 23 Feb 2012

HP Enterprise Security

E-Guide: How to tie SIM to identity management for security effectiveness
sponsored by TechTarget Security
EGUIDE: Security information management systems and identity and access management systems were originally created to work independently, but combining these two disparate technologies presents greater security effectiveness and control.
Posted: 24 Mar 2011 | Published: 24 Mar 2011

TechTarget Security

Presentation Transcript: Balancing compliance with security
sponsored by HP Enterprise Security
PRESENTATION TRANSCRIPT: This presentation transcript explores exactly what it means to be secure and compliant, as well as how security information management (SIM) can assist organizations in achieving both.
Posted: 30 Mar 2012 | Published: 20 Mar 2012

HP Enterprise Security

Information Security IT Decision Checklist: Security Information and Event Management
sponsored by ArcSight, an HP Company
EGUIDE: This Information Security IT Decision Checklist explores key business and technical areas you should consider before selecting a security information and event management system. Also included in this guide is a list of SIMs and log management vendors to help in your decision process.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

ArcSight, an HP Company

The convergence of 5G, SD-WAN and Zero Trust for enterprise WAN transformation
sponsored by Cradlepoint
WEBCAST: This session talks about how enterprises can design their next-generation WAN leveraging 5G, SD-WAN and ZTNA, and ensuring application QoE, enhanced resiliency and more effective security. Watch now to learn how ZTNA-based SD-WAN micro-segmentation will enhance enterprise networks while reducing cost.
Posted: 06 Dec 2022 | Premiered: Dec 7, 2022

TOPICS:  .NET
Cradlepoint

Buyer’s Guide to Antimalware
sponsored by AVG Technologies USA, Inc.
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

AVG Technologies USA, Inc.

Buyer’s Guide to Antimalware
sponsored by Panda Security
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.
Posted: 30 Oct 2009 | Published: 27 Oct 2009

Panda Security

SIEM Best Practices for Advanced Attack Detection
sponsored by TechTarget Security
EGUIDE: The industry has panned SIEM as an expensive and under performing technology. But to be clear, it's not a technology problem, it's a process issue. In this tech tip, Securosis analyst Mike Rothman will outline a time tested process to build SIEM policies which actually alert on the attacks you need to protect against.
Posted: 17 May 2013 | Published: 17 May 2013

TechTarget Security

LogRhythm 3-Minute Product Demo
sponsored by LogRhythm, Inc.
PRODUCT DEMO: This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
Posted: 09 Sep 2009 | Premiered: 09 Sep 2009

LogRhythm, Inc.

SARCOM Simplifies Storage: Virtualization Makes Provisioning and Management Much Easier - and More Cost Effective
sponsored by Hewlett Packard Enterprise
CASE STUDY: Using HP StorageWorks Command View EVA software, the SARCOM staff could allocate storage resources to meet demand in real time.
Posted: 25 Nov 2008 | Published: 24 Nov 2008

Hewlett Packard Enterprise

Addressing the Limitations of Multi-Factor Authentication (MFA)
sponsored by Portnox
BLOG: Along with exploring 4 limitations of multi-factor authentication (MFA), this blog post maps out how you can level up your security strategy by pairing MFA with digital certificates. Keep reading to review these authentication insights.
Posted: 16 Feb 2024 | Published: 16 Feb 2024

TOPICS:  .NET
Portnox