IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed   
Security Event Management Reports
1 - 25 of 410 Matches Previous Page  |  Next Page
Employees Behaving Badly? Why Awareness Training Matters
sponsored by Mimecast
WHITE PAPER: Making awareness training part of your cyber-resilience planning is essential to keeping your organization secure. In general, employees are not doing bad things on purpose, but their actions can greatly impact the security of your organization and data. In this white paper, discover 6 ways to make security awareness a part of your culture.
Posted: 18 Apr 2019 | Published: 17 Oct 2018

Mimecast

Advanced Threat Prevention Appliance
sponsored by Juniper Networks
WHITE PAPER: Organizations worldwide face security and productivity challenges every day. Additionally, security teams often fail to recognize and act on critical incidents. In this white paper, learn how the Juniper Networks Advanced Threat Prevention Appliance can protect organizations from cyberattacks.
Posted: 17 Apr 2019 | Published: 31 Oct 2018

Juniper Networks

Endpoint Protection Plus Webinar
sponsored by Ziften
WEBCAST: Endpoint protection can be complex and leave your organization vulnerable to attackers. This is because most endpoints aren't patched or users disable security tools. In this webcast, listen as Ziften's Roark Pollock and Logan Gilbert discuss 10 things to consider when looking at endpoint protection platforms.
Posted: 16 Apr 2019 | Premiered: Apr 16, 2019

Ziften

Autonomous Threat Hunting
sponsored by Verizon
WHITE PAPER: With Verizon's Autonomous Threat Hunting, you can transform massive amounts of system logs and threat data into high-quality, prioritized alerts. Download this white paper to learn more.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Verizon

Introducing the Verizon Risk Report
sponsored by Verizon
RESEARCH CONTENT: This Verizon Risk Report uses daily threat cyber-risk intelligence from multiple sources allowing businesses to make data-driven security decisions and focus their security spending on where it will have the most impact.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Verizon

Security Information and Event Management (SIEM) Solutions
sponsored by Rapid7
WHITE PAPER: As the security landscape has evolved, SIEMs have evolved as well. However, many organizations struggle to deploy a new SIEM, achieve rapid success, and deliver a return on investment. In this white paper, learn how to evaluate SIEM platforms. Also, discover the top 3 capabilities every SIEM should provide.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Rapid7

The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER: Security operations are often slowed down by manual processes that would be better left to machines. As a result, security orchestration and automation is becoming an increasingly vital aspect of many organizations' security strategies. In this white paper, explore the benefits and value of security orchestration and automation.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Rapid7

Quarterly Threat Report Q4
sponsored by Rapid7
RESEARCH CONTENT: This issue of the Rapid7 Quarterly Threat Report takes a deep dive into the threat landscape for 2018 Q4 and looks more broadly at 2018 as a whole. The report provides an assessment of threat events by organization size and industry, and examines threat incident patterns. Download the report to explore highlights from the 2018 Q4 report.
Posted: 08 Apr 2019 | Published: 26 Feb 2019

Rapid7

Security Automation Best Practices
sponsored by Rapid7
WHITE PAPER: While processes make it possible to get a job done faster, creating ones that solve practical problems and result in measurable efficiency gains can be a time-consuming task. This is where security automation comes in. In this white paper, explore 4 best practices to help ensure your security team is successful with automation.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Rapid7

Security Orchestration and Automation Solutions
sponsored by Rapid7
WHITE PAPER: One of the fastest growing security trends right now is the adoption of security orchestration and automation platforms. In this white paper, learn why security orchestration and automation are becoming increasingly essential tools to improve agility, responsiveness, accuracy, and efficiency.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Rapid7

6 Steps to Comprehensive Container Security
sponsored by Trend Micro, Inc.
WHITE PAPER: Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.
Posted: 04 Apr 2019 | Published: 31 Mar 2019

Trend Micro, Inc.

How to Deploy SOAR
sponsored by D3 Security
WHITE PAPER: SOAR platforms are revolutionizing security operations by adding cutting-edge technology to the critical processes of reacting to, and mitigating the damage of, cyberattacks, data breaches, and other adverse events. In this white paper, explore the process of deploying a SOAR platform, and the important considerations at every stage.
Posted: 04 Apr 2019 | Published: 04 Apr 2019

D3 Security

How to Prepare for Orchestration & Automation
sponsored by D3 Security
WHITE PAPER: Sophisticated cyberattacks and a siloed IT ecosystem have promoted the rise of SOAR technology. Security teams must understand how to prepare for and deploy SOAR. In this white paper, explore 5 actions that you can take to prepare your SOC for SOAR.
Posted: 03 Apr 2019 | Published: 03 Apr 2019

D3 Security

What is SOAR, Exactly?
sponsored by D3 Security
WHITE PAPER: A SOAR platform incorporates many different functions and activities. These functions including orchestration, automation incident management and report. In this white paper, learn about main requirements for each function in a SOAR. Also, explore how SOAR tools can help organizations to meet their goals.
Posted: 03 Apr 2019 | Published: 03 Apr 2019

D3 Security

SOAR Buyer's Guide
sponsored by D3 Security
WHITE PAPER: Orchestration and automation have nearly limitless benefits for your security operations, but you first need to have a solid foundation. In this white paper, explore 3 questions you and your team should answer before you begin to evaluate a SOAR platform.
Posted: 02 Apr 2019 | Published: 02 Apr 2019

D3 Security

Redefining Security Orchestration, Automation & Response with the MITRE ATT&CK Framework
sponsored by D3 Security
WHITE PAPER: SOAR platforms are broadly effective at the linear process of in-taking events and orchestrating response actions. However, they vary in their ability to support larger investigations that identify the scope of an incident. In this white paper, learn more about SOAR platforms including key differences between event-based and intent-based response.
Posted: 02 Apr 2019 | Published: 02 Apr 2019

D3 Security

Top 3 Causes of Endpoint Security Failure
sponsored by Comodo
RESOURCE: Endpoint security has been radically redefined in recent years making it essential that organizations rethink and rearchitect how they prevent cybercriminals. This paper looks at 3 major reasons for endpoint security failure, why solving the problem is becoming more difficult and where to look for endpoint security platforms.
Posted: 02 Apr 2019 | Published: 02 Apr 2019

Comodo

Market Guide for Cloud Workload Protection Platforms: Assessment
sponsored by Trend Micro, Inc.
RESOURCE: With the rise of cloud adoption, there is a fast-moving shift from traditional signature-based end-user security to a much more tactful and strategic approach to protecting cloud servers and workloads. In this resource, explore 5 buyer recommendations to address security and compliance risks inherent in public cloud environments.
Posted: 02 Apr 2019 | Published: 02 Apr 2019

Trend Micro, Inc.

How to Get Started with the NIST Cybersecurity Framework
sponsored by Expel
WHITE PAPER: The NIST Cybersecurity Framework can be very useful to help companies understand where they are and where they are going as they grow their broader cyber risk management program. In this white paper, Expel shares how using their Expel service has helped their CSF scores. Also learn how Expel can help you on the road to CSF nirvana.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

Expel

SOAR-Native SOC
sponsored by D3 Security
WHITE PAPER: If you already have some detection tools and ad hoc processes, and are transforming those elements into a formal SOC, now is an optimal time to learn how to leverage a SOAR platform's capabilities. In this white paper, explore the benefits of implementing a SOAR platform into your SOC.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

D3 Security

The SOAR Buyer's Guide
sponsored by Splunk Services UK Ltd
WHITE PAPER: Investing in a SOAR platform is a wise and highly strategic decision. After all, choosing the platform to build your SOC on is arguably more important than choosing any point security product. This white paper aims to outline the important criteria you should consider when evaluating SOAR platforms.
Posted: 26 Mar 2019 | Published: 26 Mar 2019

Splunk Services UK Ltd

Automating Malware Investigation at One of the World's Leading Investment Firms
sponsored by Splunk Services UK Ltd
CASE STUDY: Blackstone's Incident Response team used to investigate each malware alert as if a compromise has already occurred. Considering the volume of alerts and the potential for inconsistency in any manual process, Blackstone knew there had to be a better way. In this case study, learn about the benefits that Blackstone saw since deploying Splunk Phantom.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk Services UK Ltd

The Essential Guide To Fraud
sponsored by Splunk
WHITE PAPER: Threat actors are constantly discovering new ways to commit fraud to exploit a wide range of online services. Companies and their customers face the risk of losing money, ruining reputations and protecting the integrity of programs. In this white paper, learn how to protect your business against fraudulent activity.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk

The SIEM Buyer's Guide
sponsored by Splunk Services UK Ltd
WHITE PAPER: Today's most serious threats act across multiple systems and use advanced evasion techniques to avoid detection. Without a SIEM, attacks germinate and grow into catastrophic incidents. In this white paper, learn the basics of a SIEM, 7 essential capabilities of an analytics-driven SIEM and the 9 technical capabilities of a modern SIEM.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk Services UK Ltd

IT Security New Analytics-Driven Model
sponsored by Splunk
RESEARCH CONTENT: Enterprises today must protect not only their own data, systems, and intellectual property, but also content shared by third-parties. Lapses can be very disruptive to an organization. In this research report, explore key findings from a survey on cybersecurity practices. Also explore tips for building a strong cybersecurity program.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk
1 - 25 of 410 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement