IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Log Monitoring

RSS Feed   
Security Event Log Monitoring White Papers (View All Report Types)
 
Preventing Insider Threats with UEBA
sponsored by Exabeam
WHITE PAPER: Protecting against insider threats is a tough task for organizations, mainly because harm can be caused maliciously or unintentionally. Tracking user behavior is the key to success in mitigating insider threats, and by reading this white paper, you can learn about User and Entity Behavior Analytics (UEBA) a platform that may be up to the task.
Posted: 24 Nov 2020 | Published: 08 Sep 2020

Exabeam

Reducing Security Risk in the Financial Services Industry
sponsored by AWS Rapid7
WHITE PAPER: A report from the Department of Digital, Culture, Media and Sport revealed almost half of UK businesses (46%) have had cybersecurity breaches or attacks in the last 12 months. The financial services industry is a prime target for such attacks, but by absorbing this white paper, you can learn measures to take to reduce organizational risk.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

AWS Rapid7

5 Tips for Transforming Your Endpoint Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Organizations that are digitally transforming and moving to the cloud are expanding their attack surface, and as a result, they need to ensure the effectiveness of their endpoint security. What steps can you take to keep your endpoints uncompromised? Browse this Cisco white paper to examine 5 tips for transforming endpoint security.
Posted: 07 Dec 2020 | Published: 30 Sep 2020

Cisco Systems, Inc.

Security and Compliance Automation for Financial Services
sponsored by Red Hat and Intel
WHITE PAPER: A SANS Institute survey showed that unauthorized access is the No. 1 concern around cloud environments. This is especially true for businesses in financial services, who must maintain constant compliance amidst grueling regulations. By downloading this white paper, learn how automation can help these businesses remain both secure and compliant.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

Red Hat and Intel

Critical Considerations for Securing Hybrid and Hyperscale Data Centers
sponsored by Fortinet, Inc.
WHITE PAPER: Modern hybrid and hyperscale data center architectures must include security that can keep pace. But in many of these data center environments today, traditional network security solutions underperform and underserve, forcing compromises on either security or performance. Read this checklist to learn how you can work around this issue.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Fortinet, Inc.

Has ID Card Issuance Been Marooned on a Desert Island?
sponsored by HID Global
WHITE PAPER: As organizations today put more considerations into how they secure access to critical data, the case for incorporating security cards becomes stronger. Read this brief to discover 10 reasons why ID card issuance is worth revisiting and explore the benefits organizations could realize from its use.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

HID Global

5 Steps to Secure Home Devices & Improve Productivity for Remote Work
sponsored by Barracuda
WHITE PAPER: Due to the pandemic, remote work became an essential part of a modern enterprise. But for remote work and employees to thrive, they need fast and secure access to data. Read on to discover 5 steps organizations can take to further secure their remote workers, without sacrificing productivity.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

IAM: Globalization & Large-Scale Enterprise
sponsored by IC Consult
WHITE PAPER: A growing number of workloads and IT services are moving to the cloud, and IAM is no exception. Moving IAM to the cloud helps avoid the integration, management and licensing complexity of hybrid IT environments (some workloads running on-prem, others in parallel in the cloud). Download this white paper to explore Identity-as-a-Service (IDaaS).
Posted: 12 Jan 2021 | Published: 12 May 2020

IC Consult

IT-GRC Tools
sponsored by ServiceNow
WHITE PAPER: IT GRC tools are emerging as one of the most effective ways for organizations to create, organize and manage GRC policies. This KuppingerCole Market Compass report covers the top IT GRC vendors and tools that can assist organizations in reducing the risk of non-compliance – read on to unlock the full report.
Posted: 12 Oct 2020 | Published: 21 Jul 2020

ServiceNow

Transforming the SOC
sponsored by Mimecast
WHITE PAPER: Each year, organizations explore new technological territories and hackers grow more complex. This is made more difficult by an ever-expanding cybersecurity skills gap. This resource captures the expertise of independent industry leaders dedicated to addressing this imbalance by helping organizations rethink security operations – download now.
Posted: 05 Jan 2021 | Published: 16 Jul 2020

Mimecast
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info