IT Agents  >   Professional Organizations  >   Information Industry Professional Organizations  >  

SIM

RSS Feed   
SIM Reports
 
IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Technology, Innovation and Change
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: IT leaders identify the technologies most likely to impact on their organisations approach to change and innovation in this study by Theron LLP and Computer Weekly.
Posted: 05 Aug 2013 | Published: 02 Aug 2013

ComputerWeekly.com

Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by SearchCRM
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchCRM

IBM DeveloperWorks
sponsored by IBM
SOFTWARE DOWNLOAD: The Internet provides great opportunities for networking and learning – and IT is no different. Register now for developerWorks and create your profile for access, not only to articles, webcasts and software downloads, but also a wealth of other IT professionals.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011

IBM

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

SIM Technical Guide
sponsored by SearchSecurity.com
EZINE: In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.
Posted: 08 Mar 2013 | Published: 08 Mar 2013

SearchSecurity.com

Technical Guide on SIM
sponsored by SearchSecurity.com
EGUIDE: Security information and event management solutions are an indispensible technology in IT security programs to help solidify data protection and compliance initiatives. In this comprehensive guide to SIM, our experts provide authoritative technical advice to help ensure effective SIM deployments and proper on-going maintenance.
Posted: 16 Aug 2011 | Published: 16 Aug 2011

SearchSecurity.com

E-Guide: Uniting SIM and IAM to Boost Security
sponsored by SearchSecurity.com
EGUIDE: When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

SearchSecurity.com

Essential Guide to SIMs Strategy
sponsored by Information Security Magazine
EGUIDE: Take an incremental approach to security information and event management. Start slow, narrow your goals and be patient with these expensive and complex tools, otherwise data overload will bring you down. Read this guide to find out so much more.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Information Security Magazine

E-Guide: Bringing Value to Application Monitoring Through SIM
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide describes the value that security information and management systems (SIMs) can bring to both application monitoring and real-time security. See how you can get the most out of SIM by reading on now.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchSecurity.com

E-Guide: Selecting a SIM for midmarket business
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses the evolvement of SIM tools, differences in deployment processes and top requirements you should consider before making a decision.
Posted: 01 Nov 2011 | Published: 31 Oct 2011

SearchSecurity.com

Technical Guide on SIM: Moving beyond network security toward protecting applications
sponsored by SearchSecurity.com
EGUIDE: SIMs have been widely adopted for their value in correlating, reporting and alerting on network security. But SIMs can be used for more than just network security monitoring. The same tools can also bring value to application managers if used correctly. In this technical guide, gain 4 steps for integrating applications into enterprise SIMs.
Posted: 01 Jan 2012 | Published: 20 Dec 2011

SearchSecurity.com

IT Decision Checklist: SIMs and Log Management
sponsored by LogLogic, Inc.
EGUIDE: In this paper, you'll learn that Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We'll outline what you should look for to get the most relevant data from SIMs.
Posted: 05 Jan 2010 | Published: 05 Jan 2010

LogLogic, Inc.

Improving regulatory compliance management through log analysis, SIM
sponsored by HP Enterprise Security
EGUIDE: This E-Guide highlights the importance of log analysis and security information and event management (SIEM) in improving regulatory compliance management.
Posted: 30 Mar 2012 | Published: 30 Mar 2012

HP Enterprise Security

IT Decision Checklist: Security Information and Event Management
sponsored by HP Enterprise Security
EZINE: As the complexity of the networks IT manages continues to increase, so too does the volume of security-related information generated by network devices. This exclusive e-zine explores the business and technical considerations in selecting the security information management (SIM) tools you need to maintain control.
Posted: 24 Feb 2012 | Published: 23 Feb 2012

HP Enterprise Security

E-Guide: IT Decision Checklist: SIMs and Log Management
sponsored by Tripwire, Inc.
EGUIDE: Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We’ll outline what you should look for to get the most relevant data from SIMs. Read this paper to find out more.
Posted: 30 Apr 2010 | Published: 30 Apr 2010

Tripwire, Inc.

Security Information Management Systems Aspire to Real-Time Security
sponsored by Hewlett Packard Enterprise
EGUIDE: Explore security information management (SIM) systems' capabilities for real-time security, learn why the definition of "real-time" may need altering, and uncover the factors preventing SIMs from attaining real-time status.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

Hewlett Packard Enterprise

E-Guide: How to tie SIM to identity management for security effectiveness
sponsored by SearchSecurity.com
EGUIDE: Security information management systems and identity and access management systems were originally created to work independently, but combining these two disparate technologies presents greater security effectiveness and control.
Posted: 24 Mar 2011 | Published: 24 Mar 2011

SearchSecurity.com

Security Information Management Systems and Application Monitoring
sponsored by SearchSecurity.com
EGUIDE: Did you know your security information management (SIM) system can shed light on application performance issues? This E-Guide details a four-step process for integrating apps into your SIM. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

SearchSecurity.com

Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
sponsored by Information Security Magazine
EZINE: This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
Posted: 10 Jun 2009 | Published: 10 Jun 2009

Information Security Magazine

SIEM Best Practices for Advanced Attack Detection
sponsored by SearchSecurity.com
EGUIDE: The industry has panned SIEM as an expensive and under performing technology. But to be clear, it's not a technology problem, it's a process issue. In this tech tip, Securosis analyst Mike Rothman will outline a time tested process to build SIEM policies which actually alert on the attacks you need to protect against.
Posted: 17 May 2013 | Published: 17 May 2013

SearchSecurity.com

Presentation Transcript: Balancing compliance with security
sponsored by HP Enterprise Security
PRESENTATION TRANSCRIPT: This presentation transcript explores exactly what it means to be secure and compliant, as well as how security information management (SIM) can assist organizations in achieving both.
Posted: 30 Mar 2012 | Published: 20 Mar 2012

HP Enterprise Security

Information Security IT Decision Checklist: Security Information and Event Management
sponsored by ArcSight, an HP Company
EGUIDE: This Information Security IT Decision Checklist explores key business and technical areas you should consider before selecting a security information and event management system. Also included in this guide is a list of SIMs and log management vendors to help in your decision process.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

ArcSight, an HP Company

Buyer’s Guide to Antimalware
sponsored by AVG Technologies USA, Inc.
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

AVG Technologies USA, Inc.

Buyer’s Guide to Antimalware
sponsored by Panda Security
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.
Posted: 30 Oct 2009 | Published: 27 Oct 2009

Panda Security

SARCOM Simplifies Storage: Virtualization Makes Provisioning and Management Much Easier - and More Cost Effective
sponsored by Hewlett Packard Enterprise
CASE STUDY: Using HP StorageWorks Command View EVA software, the SARCOM staff could allocate storage resources to meet demand in real time.
Posted: 25 Nov 2008 | Published: 24 Nov 2008

Hewlett Packard Enterprise

June Issue of Information Security magazine: Mobile Security: A New Game Plan
sponsored by Information Security Magazine
EZINE: This month's Information Security Magazine Online cover story highlights the importance for an updated security game plan due to the influx of personal smartphones and other computing devices making their way into the enterprise. Also, learn how to focus your SIM solution to avoid information overload and explore FISMA challenges.
Posted: 02 Jun 2011 | Published: 02 Jun 2011

Information Security Magazine

Gartner's Magic Quadrant for Security Information and Event Management 2008
sponsored by RSA Conference
WHITE PAPER: Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA Conference

The Improvement and Evolution of SIEM
sponsored by SearchSecurity.com
EGUIDE: Get an in-depth look at the past, present and future of security information and event management (SIEM) technology in this informative E-Guide from SearchSecurity.com.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

SearchSecurity.com

The Future of Next-Generation SIEM
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide explores what it means to be an "ideal" security information and event management (SIEM) system and takes a look into a crystal ball to explore five futures SIEMs must conquer to be considered next-gen systems. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

SearchSecurity.com
 
Browse by Report Type:
SIM White Papers | SIM Multimedia | SIM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info