IT Management  >   Systems Operations  >   Security  >   Security Management  >  


RSS Feed   
SIEM Reports
The SIEM That Gives SIEM a Good Name and Gives Your ROI a Big Boost
sponsored by Empow Cyber Security
RESOURCE: Is your current SIEM platform creating more problems than it solves? Download this resource to find out how you can implement a new SIEM platform to enhance your company's overall security and increase ROI.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Empow Cyber Security

The Forrester Wave: Security Analytics Platform, Q3 2018
sponsored by LogRhythm, Inc.
RESEARCH CONTENT: Explore 13 security analytics providers and how they stack up.
Posted: 12 Nov 2018 | Published: 21 Sep 2018

LogRhythm, Inc.

Intrusion Detection Systems (IDS)
sponsored by Armor
WHITE PAPER: In this white paper, learn about 2 different Intrusion Detection Systems (IDS) that can analyze and correlate all security events, and trigger further investigation by a Security Operations Center when necessary.
Posted: 19 Nov 2018 | Published: 19 Nov 2018


Building Daily Habits to Stay Ahead of Security Fires
sponsored by ThreatConnect
RESOURCE: Learn how to efficiently track your vulnerabilities and manage security incidents inside your organization.
Posted: 16 Oct 2018 | Published: 14 Jun 2018


The Challenge of Building the Right Security Automation Architecture
sponsored by Juniper Networks
RESEARCH CONTENT: This Ponemon research report examines how the use of a security automation architecture is changing the game for cybersecurity. Find out how organizations have already started using automation to improve their security postures.
Posted: 17 Jul 2018 | Published: 30 Jun 2018

Juniper Networks

ThreatConnect Current Trends
sponsored by ThreatConnect
RESOURCE: The 2018 Building a Threat Intelligence Program Survey reveals an increased prevention of phishing attacks, ransomware attacks, and business email compromise with organizations using a mature threat intelligence program. Download this resource for more positive results.
Posted: 18 Oct 2018 | Published: 18 Oct 2018


Automating Incident Response
sponsored by Swimlane
WHITE PAPER: Staying on top of thousands of security alerts every day is exhausting for a cybersecurity team and missing even one incident can contribute to risk exposure. Learn how automated incident response and security orchestration can help alleviate these issues for your security team, today.
Posted: 11 Oct 2018 | Published: 11 Oct 2018


SIEM + Threat Intelligence: Quickly Identify the Threats that Matter to You
sponsored by ThreatConnect
WHITE PAPER: SIEMs are a powerful tool for collecting and correlating event data and have a well-deserved place within your security infrastructure. But, to truly shine they need to be supported by a cybersecurity platform. Read on to find out how your organization can enhance its SIEM with a cybersecurity platform, today.
Posted: 03 Oct 2018 | Published: 03 Oct 2018


Security Event Monitoring Report
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Organizations are facing increasing pressure to implement security event monitoring to improve threat detection capabilities and address regulatory compliance requirements. Inside this Gartner report uncover key challenges and recommendations for improving SIEM strategies.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

Arctic Wolf Networks, Inc.

How to Avoid Being Spooked by Shadow IT
sponsored by Kaseya
RESOURCE: Shine the light on shadow IT and find out how your organization can protect its data with vulnerability management software and automated patching.
Posted: 27 Jul 2018 | Published: 27 Jul 2018


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement