IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed   
Security Administration Reports
 
2019 SIEM Report
sponsored by HelpSystems
RESEARCH CONTENT: This 2019 SIEM Report explores the latest trends, key challenges, and solution preferences for SIEM. Read on for cybersecurity statistics that can help you decide if a SIEM system is right for your organization.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

HelpSystems

Cryptojacking
sponsored by Symantec
WEBCAST: Cryptojacking can be a nuisance to your employees but, more importantly, these attacks can result in unexpected increases in your business costs. There are two types of cryptojacking attacks: file-based and browser-based attacks. In this webcast, walk through how a typical browser-based cryptojacking scenario might play out.
Posted: 06 Mar 2019 | Premiered: Mar 6, 2019

Symantec

No Time to Lose: How to Help Ensure Your ICS Infrastructure Complies with the EU's NIS Directive
sponsored by ForeScout
EBOOK: This e-book explains the NIS Directive and its implications for essential service providers that depend on ICS networks to operate effectively. It also defines how essential service providers should assess solutions designed to support NIS compliance.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

ForeScout

The SIEM Buyer's Guide
sponsored by Splunk Services UK Ltd
WHITE PAPER: Today's most serious threats act across multiple systems and use advanced evasion techniques to avoid detection. Without a SIEM, attacks germinate and grow into catastrophic incidents. In this white paper, learn the basics of a SIEM, 7 essential capabilities of an analytics-driven SIEM and the 9 technical capabilities of a modern SIEM.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk Services UK Ltd

The Five Most Creative Ways that Organizations are Using Advanced Authentication
sponsored by Micro Focus
VIDEO: In this webinar, hear from identity and access management experts, Kent Purdy and Troy Drewry, about the new ways organizations are using the latest authentication technologies and how they're preparing the future.
Posted: 04 Mar 2019 | Premiered: 04 Mar 2019

Micro Focus

Laying the Foundation for GDPR Compliance
sponsored by SentryOne LLC
WHITE PAPER: The GDPR is in effect but, many businesses are still struggling with how to properly implement protections across systems and processes. This white paper discusses the 4 key rights that European citizens have under GDPR, and what businesses need to do to ensure they are GDPR compliant.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

SentryOne LLC

Secure Print Services Are Key to Digital Transformation
sponsored by HP
RESOURCE: Today's digital technologies mean every device connected to the network is potentially an endpoint security risk—including printers and print infrastructure. In this article, learn how to protect your print environment from threats.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

HP

2019 Global Threat Report
sponsored by CrowdStrike
RESEARCH CONTENT: Nation-state adversaries were continuously active throughout 2018. Looking forward, there is ample evidence that adversaries will be forced to adapt and deploy stealthier tactics in order to continue their profitable operations. In this white paper, explore CrowdStrike's recommendations to maintain a strong defense.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

CrowdStrike

Introducing the Fraud Management Solution Buyer's Kit
sponsored by Riskified
WHITE PAPER: In this eCommerce Fraud Solution Buyer's Kit, Riskified offers a series of resources designed to guide you through the process of assessing your current fraud management performance and understanding which available approaches and solutions can best meet your needs.
Posted: 13 Mar 2019 | Published: 13 Mar 2019

Riskified

How to Modernize Cybersecurity in the Legal Industry
sponsored by Arctic Wolf
WHITE PAPER: The entire legal industry faces unique challenges in ensuring proper stewardship of client materials. In this white paper, learn about why a subscription-based SOC-as-a-service is a great fit for the legal profession.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

Arctic Wolf
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement