IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed   
Security Event Management White Papers (View All Report Types)
1 - 25 of 316 Matches Previous Page  |  Next Page
Assessing Cyber Security
sponsored by ConvergeOne
WHITE PAPER: How does your organization measure success of cybersecurity? This resource offers a simple and clear way to review and assess your current information security program.
Posted: 20 Mar 2018 | Published: 20 Mar 2018


6 Steps to SIEM Success
sponsored by AlienVault
WHITE PAPER: How is your enterprise achieving SIEM success? Whether your goals are to detect threats, achieve compliance, or fuel incident response, this resource will help your SIEM strategy achieve success.
Posted: 20 Mar 2018 | Published: 20 Mar 2018


Security Predictions for 2018
sponsored by TrendMicro
WHITE PAPER: Ransomware and digital extortion are predicted to be cybercriminals go-to methods of attack in 2018. This resource offers security predictions for 2018 and what your organization should look out for to remain protected.
Posted: 20 Mar 2018 | Published: 20 Mar 2018


Incident Response Platform
sponsored by IBM Resilient
WHITE PAPER: How does your organization plan to respond to complex cyber threats? Learn how an incident response platform can significantly drive down the mean time to find, respond to, and remediate incidents.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

IBM Resilient

Cybersecurity in Financial Services: A Complex Threat Requiring a Comprehensive Strategy
sponsored by Wombat Security Technologies
WHITE PAPER: Cybersecurity problems are getting worse overtime, so strategies in place need to constantly be updated. This Osterman Research white paper offers a multi-dimensional view of the complex cybersecurity landscape that financial firms and professionals face.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

Wombat Security Technologies

Ransomware Security Protection
sponsored by enSilo
WHITE PAPER: The constant modification of ransomware variants is causing a severe threat for financial institutions worldwide. Take a look at this resource to uncover a malware protection security strategy to ensure all endpoints are secure from harmful attacks.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Integrating Human and Technological Elements in your Security Strategy
sponsored by Kaspersky Lab
WHITE PAPER: Cybercrime damages are expected to cost the world $6 trillion by 2021, according to CSO. This resource offers strategies for protecting your business from the ever-changing threat landscape.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Kaspersky Lab

Why a Unified Approach to IT and OT Network Security is Critical
sponsored by Skybox Security
WHITE PAPER: One of the biggest security challenges organizations are struggling with is limited visibility of the IT-OT attack surface. This white paper examines the challenges, implications and benefits of a unified approach to managing security in converged IT and OT networks.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Skybox Security

Economics of Insecurity
sponsored by Cylance
WHITE PAPER: Traditional AV companies don't want to help you prevent attacks. They want to help you react to breaches - so they can sell you more solutions with every intrusion. It's all part of the "Economics of Insecurity". Tired of the status quo and investing in more of the same old technology? Learn why it's time to think beyond the stack.
Posted: 01 Feb 2018 | Published: 01 Feb 2018


How to Use Micro-Segmentation to Secure Your Organization
sponsored by Illumio
WHITE PAPER: Protecting the network perimeter is not enough. Organizations looking to secure the interior of their environments often need to be more dynamic and granular than network segmentation will allow. This resource reveals how micro-segmentation can secure environments by reducing attack surfaces, hardening data centers, and enabling cloud security.
Posted: 01 Feb 2018 | Published: 01 Feb 2018


An Intelligent Response to Rising Threats
sponsored by AdvizeX Technologies
WHITE PAPER: This white paper offers an approach to enhancing your current SIEM approach to improve security and protect against ransomware and malware targeting your enterprise's data.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

AdvizeX Technologies

How to Build a Soc with Limited Resources
sponsored by LogRhythm, Inc.
WHITE PAPER: Having a security operations center (SOC) has become an absolute necessity for implementing threat lifecycle management to minimize damage caused by successful attacks. This white paper offers a guide to building an SOC with limited resources and provides the basics of the cyberattack lifecycle through the threat lifecycle management framework.
Posted: 09 Jan 2018 | Published: 09 Jan 2018

LogRhythm, Inc.

SIEM For Beginners: Everything to Know about Log Management
sponsored by AlienVault
WHITE PAPER: The more valid information depicting your network, systems, and behavior the SIEM has the more effective it will be in helping improve your security operations.This resource provides insight into the basics of log management and how improving your SIEM can boost your security posture.
Posted: 04 Jan 2018 | Published: 04 Jan 2018


Hybrid AI Takes on Cybersecurity
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Will hybrid AI disrupt your information security team? Experts agree that AI is the next step in identifying threats, but are we facing Westworld or just an evolutionary advancement? 7 security experts weigh in, inside this special report.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Arctic Wolf Networks, Inc.

The Six Essential Capabilities of an Analytics Driven SIEM
sponsored by Splunk
WHITE PAPER: Legacy SIEMs simply can't keep up with the rate and sophistication of today's cyberattacks. Access this resource to uncover the 6 essential capabilities of an analytics-driven SIEM and learn how to keep your network secure.
Posted: 04 Aug 2017 | Published: 04 Aug 2017


The Five Essential Capabilities of an Analytics-Driven SOC
sponsored by Splunk
WHITE PAPER: Organizations are now looking to analytics-driven security operations centers (SOCs) to close the gaps in their network defenses. In this white paper, uncover how a successful SOC should have 5 key attributes.
Posted: 04 Aug 2017 | Published: 04 Aug 2017


Key Benefits of Taking Your SIEM To The Cloud
sponsored by Splunk
WHITE PAPER: Explore 5 benefits of taking your SIEM platform to the cloud. As a bonus, uncover two case studies to see how organizations have gained key advantages, like lowering operational costs, increasing focus on strategic initiatives, and more.
Posted: 03 Aug 2017 | Published: 03 Aug 2017


How Machine Data Supports GDPR Compliance
sponsored by Splunk
WHITE PAPER: Discover an overview of the GDPR and explore how machine data can help you meet the core requirements. Uncover the 3 ways machine data can help support your GDPR compliance program.
Posted: 03 Aug 2017 | Published: 03 Aug 2017


How to Detect Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: Explore two analytical strategies that can help you detect unknown malware activity and early signs of compromise in a Windows environment. Discover how these approaches work in real-time to detect advanced threats faster.
Posted: 02 Aug 2017 | Published: 02 Aug 2017


10 Advantages of a Proxy Deployment with a Next-Generation Firewall
sponsored by Symantec
WHITE PAPER: Ensuring that your organization has a layered defense strategy in place is vital to combat today's threat landscape. Learn 10 advantages of layered defense, and what can be gained from pairing a proxy deployment with a next-generation firewall
Posted: 16 Jun 2017 | Published: 16 Jun 2017


Exploring Incident Response Sevices
sponsored by Rapid7
WHITE PAPER: In this white paper, learn how Rapid7's Incident Response Services can help your organization prepare for and manage a breach. Read on to find how tabletop exercises, compromise assessments, readiness evaluations and more can help keep your data safe.
Posted: 27 Nov 2017 | Published: 27 Nov 2017


SIEM Analyst Research Bundle
sponsored by AlienVault
WHITE PAPER: No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
Posted: 19 Oct 2017 | Published: 19 Oct 2017


Internet Security Threat Report
sponsored by Symantec
WHITE PAPER: In this comprehensive guide, review some of the major security attacks and vulnerabilities from 2016, and learn how it can inform your policy moving into the future.
Posted: 08 Aug 2017 | Published: 28 Apr 2017


Securing Industrial IoT Technology: 4 Key Considerations
sponsored by Bayshore Networks
WHITE PAPER: Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Bayshore Networks

Navigating The Evolving Threat Landscape with Network Security
sponsored by TrendMicro
WHITE PAPER: Discover why targeted attacks are the weapon of choice: a far more lucrative tactic that uses malware purpose-built to bypass defenses and penetrate the network of a single organization. Learn how to combat these threats with network security tactics.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

1 - 25 of 316 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement