IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed   
Security Event Management Reports
1 - 25 of 717 Matches Previous Page  |  Next Page
Intrusion Detection Systems (IDS)
sponsored by Armor
WHITE PAPER: In this white paper, learn about 2 different Intrusion Detection Systems (IDS) that can analyze and correlate all security events, and trigger further investigation by a Security Operations Center when necessary.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Armor

The State of Application Security in Today's Application Economy
sponsored by Micro Focus
WHITE PAPER: As companies become active players in the application economy, the implications of security—and the lack thereof—loom over them. Organizations that have never before given thought to security are now concerned about the risk posed by their applications. In this IDG quick poll, uncover considerations for building your application security strategy.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Micro Focus

IT Procurement: The Weak Link in Government Security
sponsored by HP
RESOURCE: In this resource, uncover IDC's findings on the extent to which device security is being considered in public procurement of PCs and printers.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

HP

Best Practices for Applying Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: In this white paper, learn how threat data can be processed into information and (ultimately) intelligence. Plus, explore the 4 key areas your threat intelligence implementation must deliver.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Recorded Future

Employing Machine Learning in Security and UEBA: A Data-Science Driven Approach
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to learn how machine learning can enable your team and technology to be better, smarter, and faster by having advanced analytics at its fingertips to solve real problems – like detecting User and Entity Behavior Analytics threats – quickly.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

LogRhythm, Inc.

How to Build a SOC with Limited Resources: Your Guide to Detecting and Responding to Threats Fast
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to learn how you can integrate a threat lifecycle management platform to successfully build a SOC, even with limited resources.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

LogRhythm, Inc.

How You Can Use the Dark Web for Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: Deciphering the terminology around what the dark web is or isn't can be confusing. Learn how to better understand the dark web, the potential benefits of information gathered from these anonymous communities, and how it can be used to produce valuable threat intelligence.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Recorded Future

The Threat Intelligence Handbook: A Practical Guide for Security Teams to Unlocking the Power of Intelligence
sponsored by Recorded Future
EBOOK: It's easy to find descriptions of what threat intelligence is. But it's harder to learn how to use it to truly make your organization safe from cybercriminals. Continue reading to learn how threat intelligence can help everyone in cybersecurity anticipate problems, respond faster to attacks, and make better decisions on how to reduce risk.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Recorded Future

Understanding Security Processes and the Need to Automate
sponsored by Skybox Security
RESEARCH CONTENT: Most organizations have room to grow in their understanding of key security and security automation processes. In this report, explore the results of an in-depth Osterman Research survey focused on understanding current security processes and how organizations are working to improve and automate them.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Skybox Security

Busting Threat Intelligence Myths: A Guide for Security Pros
sponsored by Recorded Future
WHITE PAPER: There are many misconceptions about what threat intelligence is, leading many security pros to believe that threat intelligence doesn't have an advantage to bring into their particular role. Explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Recorded Future

Asia-Pacific 2018 Cybersecurity: Perceptions & Practices
sponsored by LogRhythm, Inc.
RESEARCH CONTENT: Download the Asia-Pacific 2018 Cybersecurity: Perceptions & Practices survey to learn about the state of security infrastructure for organizations across the globe
Posted: 12 Nov 2018 | Published: 12 Nov 2018

LogRhythm, Inc.

The Forrester Wave: Security Analytics Platform, Q3 2018
sponsored by LogRhythm, Inc.
RESEARCH CONTENT: Explore 13 security analytics providers and how they stack up.
Posted: 12 Nov 2018 | Published: 21 Sep 2018

LogRhythm, Inc.

The Buyer's Guide to Cyber Threat Intelligence
sponsored by Recorded Future
RESOURCE: Download The Buyer's Guide to Cyber Threat Intelligence for 11 questions you should answer before you invest.
Posted: 12 Nov 2018 | Published: 12 Nov 2018

Recorded Future

The 3 Critical Steps to Building Situational Awareness and Response in Federal Agencies
sponsored by IBM
VIDEO: Tune into this webcast to learn all about the 3 critical steps to building situational awareness & response.
Posted: 07 Nov 2018 | Premiered: 07 Nov 2018

IBM

A New SIEM for a New World
sponsored by Empow Cyber Security
VIDEO: Don't get overwhelmed by the onrush of cybersecurity data – protect your organization by leveraging a modern SIEM that uses AI-powered analytics and automation to process that large volume of data and turn it to your advantage.
Posted: 31 Oct 2018 | Premiered: 25 Oct 2018

Empow Cyber Security

ThreatConnect Current Trends
sponsored by ThreatConnect
RESOURCE: The 2018 Building a Threat Intelligence Program Survey reveals an increased prevention of phishing attacks, ransomware attacks, and business email compromise with organizations using a mature threat intelligence program. Download this resource for more positive results.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

ThreatConnect

Building Daily Habits to Stay Ahead of Security Fires
sponsored by ThreatConnect
RESOURCE: Learn how to efficiently track your vulnerabilities and manage security incidents inside your organization.
Posted: 16 Oct 2018 | Published: 14 Jun 2018

ThreatConnect

Automating Incident Response
sponsored by Swimlane
WHITE PAPER: Staying on top of thousands of security alerts every day is exhausting for a cybersecurity team and missing even one incident can contribute to risk exposure. Learn how automated incident response and security orchestration can help alleviate these issues for your security team, today.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Swimlane

Introducing ThreatConnect's Intel Report Cards
sponsored by ThreatConnect
PRODUCT OVERVIEW: Learn about the report card feature and metrics, and how you can use insights into how certain feeds are performing within your threat intelligence platform to make better decisions throughout your security lifecycle.
Posted: 11 Oct 2018 | Published: 03 May 2018

ThreatConnect

Playbook Fridays: Forcing Active Directory (AD) Password Resets via ThreatConnect Victims
sponsored by ThreatConnect
RESOURCE: This blog post highlights an intelligence driven orchestration platform that automates almost any cybersecurity task, runs in real time, and provides you with detail information about each run. Find out how this platform can integrate with your active directory service to detect attacks and prevent damaging breaches.
Posted: 11 Oct 2018 | Published: 08 May 2018

ThreatConnect

A CISO Guide to Modern Security Architecture
sponsored by Fortinet, Inc.
WHITE PAPER: In this guide, learn how implementing a modern security architecture can secure your entire organization, meet the demands of compliance, and proactively manage risk.
Posted: 10 Oct 2018 | Published: 10 Oct 2018

Fortinet, Inc.

Gain Security Visibility and Strengthen HIPAA Compliance with the AWN CyberSOC Service
sponsored by Arctic Wolf
CASE STUDY: Download this case study to learn why Bethesda Health Group chose to implement Arctic Wolf's AWN CyberSOC to protect their network, while helping them reach their HIPAA compliance goals and prevent cyberattacks.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Arctic Wolf

The State of Web Application Security
sponsored by Radware
WHITE PAPER: Download this white paper on web application security for a summary of current global perceptions on the state of application attacks, and insights on how to best identify and mitigate threats in the future.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

Radware

Market Guide for User and Entity Behavior Analytics
sponsored by LogRhythm, Inc.
ANALYST REPORT: Learn more about where the UEBA market is going and how SIEM and UEBA are converging to make more advanced analytics, collection, storage and platform capabilities.
Posted: 09 Nov 2018 | Published: 09 Nov 2018

LogRhythm, Inc.

Security Maturity: Mapping the Road to Resilience
sponsored by Dell SecureWorks
EBOOK: Download this e-book for a deep dive into risk and cybersecurity actions all organizations should consider as they think through their security strategy.
Posted: 22 Oct 2018 | Published: 22 Oct 2018

Dell SecureWorks
1 - 25 of 717 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement