IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Log Monitoring

RSS Feed   
Security Event Log Monitoring White Papers (View All Report Types)
 
6 Ways to Improve Your Cybersecurity Posture
sponsored by BDNA
WHITE PAPER: Discover 6 ways to improve your cybersecurity posture, ensuring your organization is taking up a proactive instead of a reactive approach and avoiding the pitfalls of EOL software and the CVEs.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

BDNA

Turning GDPR Compliance into Data Security
sponsored by Commvault
WHITE PAPER: Discover how to lay a solid foundation for holistic information governance and mitigate the burden of GDPR compliance
Posted: 05 Jun 2017 | Published: 05 Jun 2017

Commvault

Your Guide to the Threat Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: Take a look at five recent networking trends, why they represent real risk to your organization, and ways to implement a new security strategy that will allow you to embrace the opportunities of the digital economy with confidence.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Fortinet, Inc.

SPLUNKĀ® SOFTWARE AS A SIEM
sponsored by Splunk
WHITE PAPER: Learn a new approach to SIEM that will give your organization the ability to combat the modern threat landscape and secure its data, all from a single pane of glass.
Posted: 04 May 2017 | Published: 04 May 2017

Splunk

Encrypt Everything: How to Unshare and Secure Your Sensitive Data
sponsored by Gemalto
WHITE PAPER: Learn how to find a way to balance critical business needs and requirements for data-driven initiatives while protecting your data from malicious threats.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

5 Actions for Improving Operational Technology Security in the Data Center
sponsored by Bayshore Networks
WHITE PAPER: Uncover 5 actionable recommendations that you can start following today to improve data center operational technology (OT) security.
Posted: 24 May 2017 | Published: 24 May 2017

Bayshore Networks

Cloud Security: An Example Threat Report
sponsored by Cloudvisory
WHITE PAPER: Learn what cloud threat information is vital to ensure that your enterprise gains the ability to see exactly what is deployed, where, and in real time; instant identification of any out-of-bound usage; a "baseline" state of the cloud deployment for comparison; and more.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Cloudvisory

MSSPs: Benefits, Challenges and Trends
sponsored by AlienVault
WHITE PAPER: Discover the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource, their security programs.
Posted: 25 May 2017 | Published: 25 May 2017

AlienVault

Create an Early Warning System for Evolving Cyber Threats
sponsored by Dell SecureWorks
WHITE PAPER: Learn how to deploy an early warning system for evolving cyber threats, enabling your organization to prevent, detect, predict, and rapidly respond to cyberattacks.
Posted: 31 May 2017 | Published: 31 May 2017

Dell SecureWorks

Expert Insight: AI, Machine Learning, and Non-Malware Attacks
sponsored by Carbon Black
WHITE PAPER: See the results of over 400 experts weighing in on artificial intelligence, machine learning, and non-malware attacks.
Posted: 09 May 2017 | Published: 09 May 2017

Carbon Black
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement