IT Management  >   Systems Operations  >   Security  >   Security Management  >  

SIEM

RSS Feed   
SIEM Reports
 
The Complete Guide to Evaluating Attack Surface Management
sponsored by Randori
RESEARCH CONTENT: Attack surface management (ASM) is an emerging category of solutions which aims to help organizations understand and address risks related to the stark rise in remote devices connected to the internet – read this SANS report to learn more about the ASM market.
Posted: 16 Feb 2021 | Published: 31 Oct 2020

Randori

Market Guide for Managed Detection and Response Services
sponsored by eSentire
ANALYST REPORT: Organizations are turning to managed detection and response (MDR) services for turnkey threat detection and response via modern, remotely delivered 24/7 security operations center capabilities and technology. Use this Gartner research report to determine whether MDR is a good fit with your operational security requirements.
Posted: 16 Feb 2021 | Published: 26 Aug 2020

eSentire

Ask A CISO Ep. 04: Hard Truths In Cloud Security
sponsored by Horangi
PODCAST: In this episode of the Ask a CISO podcast, Horangi Director of Cloud Security Engineering Steve Teo joins Horangi Deputy Director of Cyber Operations Mark Fuentes to delve into the nature of cloud data breaches today and how organizations in the cloud can adapt to this growing risk – listen in to unlock their expert insight.
Posted: 04 Feb 2021 | Premiered: Feb 4, 2021

Horangi

Improve Threat Resolution Cycles by Leveraging DNS
sponsored by Infoblox
RESOURCE: Some companies may not be utilizing an effective threat detection tool that’s more common than you think: DNS. According to Forrester research, 66% of security and risk leaders said DNS catches threats their other security tools can’t. View the full Forrester infographic to see more statistics behind the effectiveness of DNS for security.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

Infoblox

Automated Pen Testing Vs Breach & Attack Simulation
sponsored by Cymulate
EGUIDE: Attack simulation and penetration testing are popular methods for organizations to find and address potential weaknesses in their security programs – but deciding between pen testing and attack simulation can be tricky. Read this e-guide for helpful tips.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

Secure SD-Wan for the Cloud-First Enterprise without Compromise
sponsored by Aruba Networks
WHITE PAPER: As enterprises move to the cloud, security challenges multiply. Examine this white paper to learn how Zscaler and Silver Peak are combining their respective Cloud Security and Unity EdgeConnect SD-WAN platforms to address these challenges. And, see how they’re collaborating to deliver security orchestration for consistent security policies.
Posted: 25 Feb 2021 | Published: 31 May 2019

Aruba Networks

Simplify and Strengthen your Strategy with Intrinsic Security
sponsored by VMware
EBOOK: Organizations are hampered by having to manage too many bolted-on security solutions. Teams are often siloed, so they work with limited context and information on the potential impact of threats. Intrinsic security lets your leverage your existing infrastructure to unify security and IT. Dive into this e-book to see how it works.
Posted: 01 Mar 2021 | Published: 31 Jul 2020

VMware

A Guide for Community Banks: Democratizing Machine Learning
sponsored by Feedzai
EGUIDE: Even pre-pandemic, customers were demanding that their financial institutions offered digital banking capabilities. The spread of COVID-19 accelerated this, and digital banking is a competitive necessity. In this e-guide, discover how COVID-19 has impacted the banking industry, including how it’s shaping the future of fraud.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

Feedzai

Taegis XDR
sponsored by Dell SecureWorks
VIDEO: Security professionals and SecOps teams tend to be stuck with stubborn legacy threat intelligence that provide meager visibility, take ages to configure and give countless false positives. For a SecOps interface that goes beyond legacy SIEMs, view this 9-minute video to explore a demo on Taegis XDR by Dell SecureWorks.
Posted: 26 Mar 2021 | Premiered: 26 Mar 2021

Dell SecureWorks

5 Questions To Ask Your Security Platform Vendor
sponsored by Cisco
DATA SHEET: The market for security platforms has become oversaturated with a wide array of vendors. This can make it a difficult process for organizations evaluating their options. To help get your started, this datasheet offers 5 key questions your organization should be asking potential security platform vendors – read on to get started.
Posted: 01 Feb 2021 | Published: 01 Feb 2021

Cisco
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info