IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Log Monitoring

RSS Feed   
Security Event Log Monitoring Reports
 
Cybersecurity Analytics and Operations in Transition
sponsored by Dell SecureWorks
RESEARCH CONTENT: Threat prevention isn't enough, as cyberthreats can circumvent threat defenses, compromise IT assets, and lead to extensive damages. This is where threat detection and response come into play. In this research report, review an assessment of organizations' cybersecurity analytics and operations plans, successes, and struggles.
Posted: 28 May 2019 | Published: 31 Jul 2017

Dell SecureWorks

Endpoint Protection Platforms
sponsored by CrowdStrike
RESEARCH CONTENT: An endpoint protection platform (EPP) is a solution deployed on endpoint devices to prevent file based malware, to detect and block malicious activity, and to provide capabilities needed to respond to security incidents. This Gartner Peer Insights report provides peer reviews and ratings of EPPs. Download the report to explore the EPP market.
Posted: 27 Mar 2019 | Published: 26 Feb 2019

CrowdStrike

CrowdStrike Incident Response and Proactive Services
sponsored by CrowdStrike
WHITE PAPER: CrowdStrike's incident response and proactive services are architected to enable organizations to quickly and effectively react to a cybersecurity incident. In this white paper, learn how CrowdStrike Services can help organizations secure and mature their security by addressing 3 fundamental questions.
Posted: 09 May 2019 | Published: 09 May 2019

CrowdStrike

Splunk® For Defense: Achieving Security and Efficiencies Through Data-Driven Intelligence
sponsored by Splunk
PRODUCT OVERVIEW: In this brief, learn how Splunk software analyzes, visualizes and monitors data from any source—from remote surveillance and user logins to heating and cooling systems—enabling defense agencies to gain the awareness required to improve security, efficiencies and intelligence gathering.
Posted: 25 Feb 2019 | Published: 25 Feb 2019

Splunk

SOCs vs. AFCs: What's the Difference?
sponsored by Optiv
RESOURCE: Advances in technology have often been perceived as threats rather than opportunities, due to the reactionary nature of the SOC model. But, Advanced Fusion Centers (AFCs) offer a modern approach to cybersecurity replacing this reactive model with an agile one. In this blog, explore the differences between SOCs and AFCs.
Posted: 01 Aug 2019 | Published: 23 Jul 2019

Optiv

Endpoint Protection Buyers Guide
sponsored by CrowdStrike
WHITE PAPER: Endpoint security is one of the most critical components of a cybersecurity strategy. Unfortunately, for those responsible for protecting their organizations' endpoints, it has never been more challenging to select the best solution for the job. In this white paper, discover an evaluation of endpoint protection platforms based on 5 key elements.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

How Yelp Connects People with Great Local Businesses Securely
sponsored by Cisco Umbrella
CASE STUDY: As Yelp's customer base and the internal infrastructure to support it has expanded, they needed to stay ahead of attacks. In order to do this, they were looking to strengthen and automate their incident response and detection processes. In this case study, discover the benefits Yelp saw after deploying Cisco Umbrella.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Cisco Umbrella

Securing Office 365 Against Data Loss and Advanced Threats
sponsored by Datto, Inc.
WEBCAST: Learn how to establish complete and comprehensive Office 365 data protection for your customers by tuning into this webcast. Topics covered include: Office 365 native protection vs. what falls under your jurisdiction, how to painlessly restore lost user data, and more.
Posted: 15 Oct 2019 | Premiered: Oct 15, 2019

Datto, Inc.

How to Deploy SOAR
sponsored by D3 Security
WHITE PAPER: SOAR platforms are revolutionizing security operations by adding cutting-edge technology to the critical processes of reacting to, and mitigating the damage of, cyberattacks, data breaches, and other adverse events. In this white paper, explore the process of deploying a SOAR platform, and the important considerations at every stage.
Posted: 04 Apr 2019 | Published: 04 Apr 2019

D3 Security

Who Needs Security Orchestration, Automation and Response?
sponsored by SearchSecurity.com
EBOOK: Who needs SOAR? The understaffed security team. Or put it another way: most security teams. In this SOAR guide, our expert contributor providers a detailed list of potential uses and details of what SOAR can do to boost the security of an organization's systems and data.
Posted: 08 May 2019 | Published: 08 May 2019

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement