IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed   
Security Event Management Reports
1 - 25 of 688 Matches Previous Page  |  Next Page
7 Experts on Security Automation and Analytics
sponsored by Juniper Networks
EBOOK: In this e-book, 7 cybersecurity experts share their insights, strategies, and best practices surrounding security automation and analytics. Learn how their takeaways can help you overcome some of the complexities associated with security automation and analytics, today.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Juniper Networks

How We Stay Ahead of a Changing Threat Landscape
sponsored by British Telecommunications PLC
RESOURCE: The security threat landscape is confusing and changing rapidly – there's so much out there, how do you understand where the true risks are? In this article, learn about how British Telecommunications is responding to the changing threat landscape and how you can apply this to your organization.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

British Telecommunications PLC

Bringing Security Architecture Into the Light – the Inherent Value of Transparency and Diagnostics
sponsored by Empow Cyber Security
RESOURCE: Many CISOs deal with the daily frustration of uncertainty with the performance of their security products in their organization's arsenal. Find out how empow's new Security Diagnostics Service can shed the light on your organization's security and help eliminate this daily issue.
Posted: 14 Sep 2018 | Published: 24 Apr 2017

Empow Cyber Security

Supplement Your Security Teams with a Managed SOC
sponsored by Oracle Dyn
RESOURCE CENTER: More IT and security leaders are leveraging a managed security operations center (SOC) as a critical line of defense in protecting their organization's assets, data, operations, and reputation. Download this custom article to explore the top 5 reasons to consider a managed SOC and what to look for in a provider.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Oracle Dyn

The SIEM That Gives SIEM a Good Name and Gives Your ROI a Big Boost
sponsored by Empow Cyber Security
RESOURCE: Is your current SIEM platform creating more problems than it solves? Download this resource to find out how you can implement a new SIEM platform to enhance your company's overall security and increase ROI.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Empow Cyber Security

University of Oklahoma Case Study
sponsored by Empow Cyber Security
CASE STUDY: In this case study, learn how The University of Oklahoma overcame its biggest security and compliance struggles after implementing a new SIEM platform.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Empow Cyber Security

Empow Solution for Higher Education
sponsored by Empow Cyber Security
WHITE PAPER: Discover how this SIEM platform was able to help top tier universities, such as MIT and other higher education organizations, enhance their overall security strategy and compliance needs.
Posted: 12 Sep 2018 | Published: 12 Sep 2018

Empow Cyber Security

Donnelley Financial Solutions Case Study
sponsored by Empow Cyber Security
CASE STUDY: Discover how Donnelley Financial Solutions, a global financial risk and compliance provider, was able to meet its security and compliance objectives after adopting a new SIEM strategy.
Posted: 12 Sep 2018 | Published: 12 Sep 2018

Empow Cyber Security

Security Information and Event Management (SIEM) Solutions
sponsored by Rapid7
EBOOK: Whether your organization is currently SIEM-less, or you're exasperated by your current SIEM, trying to find the right SIEM solution can be overwhelming. Download this guide for practical advice on choosing your first (or next) SIEM.
Posted: 12 Sep 2018 | Published: 12 Sep 2018

Rapid7

3 Components of an Effective Anti-Phishing Strategy
sponsored by Rapid7
RESOURCE: According to the 2018 Verizon Data Breach Investigations Report, phishing attacks are the number one threat to businesses today as email and social engineering are the most common methods of attack. Read on to learn how a comprehensive anti-phishing program can be built with just 3 foundational elements.
Posted: 11 Sep 2018 | Published: 11 Sep 2018

Rapid7

Quarterly Threat Report
sponsored by Rapid7
RESEARCH CONTENT: In this 2018 Q2 review, get a clear picture of the threat landscape within your unique industry, how these threats have changed, and what to expect for the rest of the year.
Posted: 11 Sep 2018 | Published: 21 Aug 2018

Rapid7

The SIEM that Gives SIEM a Good Name
sponsored by Empow Cyber Security
RESOURCE: Organizations are purchasing more and more security systems due to the increased volume of advanced cyberattacks. While SIEM systems are supposed to help this problem, some aren't meeting expectations. Read on to learn about a new SIEM platform that is used, and loved, by MIT Media Labs and other innovative companies.
Posted: 11 Sep 2018 | Published: 11 Sep 2018

Empow Cyber Security

Malware or Maleficent? Take This Quiz to Find Out
sponsored by Cisco Umbrella
WHITE PAPER: Take this quiz to learn about a security platform that uses the internet's infrastructure to block malicious destinations before a connection is ever established.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Cisco Umbrella

Top 10 Ways to Protect Your Organization from Ransomware
sponsored by Mimecast
RESOURCE: Check out this survival guide for the top 10 ways to protect your organization from ransomware.
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Mimecast

Optimize Information Management for Improved Information Security, Governance and Compliance
sponsored by Hyland
WHITE PAPER: Smart information management starts with common-sense practices and tools your organization may already own. Download this white paper to learn how your organization can reduce risk, protect information, and follow industry best practices to attain and maintain regulatory compliance.
Posted: 31 Aug 2018 | Published: 31 Aug 2018

Hyland

How Italy's Largest Service Provider Leverages Security
sponsored by Cisco Umbrella
CASE STUDY: In this case study, find out how Telecom Italia (TIM) was able to keep more than half a million business customers safe, while having a competitive advantage and an incremental revenue opportunity in the process.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

Cisco Umbrella

2018 Threat Hunting Report
sponsored by Alert Logic
RESEARCH CONTENT: In this 2018 Threat Hunting Report, discover the results from an online survey of over 460 cybersecurity and IT professionals to gain insight into the state of threat management in SOCs.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

Alert Logic

5 Ingredients To Help Your Security Team Perform at Enterprise Scale
sponsored by Respond Software
EBOOK: Every enterprise needs a successful cybersecurity program, but not all small to medium sized organizations contain the resources or the inclination to build a robust Security Operations Center. Download this e-book to find out the 5 key ingredients to building a successful Security Operations Center, without an enterprise sized budget.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

Respond Software

Defending Your Network from Cryptomining
sponsored by Cisco Umbrella
WHITE PAPER: Threat actors increasingly look toward cryptomining, the production of virtual currency, as an easy source of income. Learn how to defend your organization from malicious cryptomining with a security portfolio, today.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Cisco Umbrella

Incident Response: Are You Ready?
sponsored by Cisco Umbrella
EBOOK: Is your organization ready in the case of an incident or threat? Download this e-book for insights into building and strengthening your organization's incident response plan.
Posted: 29 Aug 2018 | Published: 28 Aug 2018

Cisco Umbrella

Using Splunk to Develop an Incident Response Plan
sponsored by Splunk
WHITE PAPER: Discover ways to help your organization prioritize threats and breaches and how machine data can help detect those breaches.
Posted: 28 Aug 2018 | Published: 28 Aug 2018

Splunk

Threat Monitoring, Detection and Response
sponsored by Alert Logic
RESEARCH CONTENT: Information security teams worldwide are increasingly concerned about the rapid growth of cyberthreats. To address this concern, a survey was conducted to explore the perspectives of cybersecurity professionals on several important threat lifecycle topics. Download this report for a comprehensive snapshot into the key survey findings.
Posted: 28 Aug 2018 | Published: 28 Aug 2018

Alert Logic

Top 5 Ways for Analyzing Entitlements and Identifying High-Risk
sponsored by One Identity
VIDEO: In this webinar, take a look at the top 5 ways for analyzing account entitlements and learn how areas of risk can be identified before a user (or cybercriminal) can abuse their access.
Posted: 23 Aug 2018 | Premiered: 20 Aug 2018

One Identity

2018 Cisco Annual Cybersecurity Report
sponsored by Cisco Umbrella
RESOURCE: What if defenders could see the future? If they knew an attack was coming, they could stop it, or mitigate its impact and help ensure what they need to protect is safe. The fact is defenders can see what's on the horizon. Download this report so you can better equip your organization for a cyberattack before it comes.
Posted: 23 Aug 2018 | Published: 23 Aug 2018

Cisco Umbrella

Want Security in the Cloud? Look to Identity First
sponsored by Okta
VIDEO: Join this webcast to discover why modern security starts with identity first and how it can help overcome your cloud frustrations.
Posted: 29 Aug 2018 | Premiered: 29 Aug 2018

Okta
1 - 25 of 688 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement