IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed   
Security Event Management Reports
1 - 25 of 552 Matches Previous Page  |  Next Page
Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 08 Oct 2021 | Published: 08 Oct 2021

ComputerWeekly.com

Computer Weekly - 7 September 2021: Highways England delivers a digital roadmap
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We also explore SIEM and SOAR security tools and we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now.
Posted: 06 Sep 2021 | Published: 07 Sep 2021

ComputerWeekly.com

Optimizing SIEM with log management
sponsored by Graylog
EBOOK: Security Information and Event Management (SIEM) is typically centered around alerts – but when those alerts go unheeded or don’t offer mitigation steps, SIEM can become expensive and ineffective. Access this e-book to explore how to make the most of SIEM with log management tools that enhance capabilities and strengthen security.
Posted: 12 Aug 2021 | Published: 12 Aug 2021

Graylog

SIEM, SOAR or both? Our security experts weigh in
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

ComputerWeekly.com

The Siem Buyer's Guide For 2021
sponsored by Splunk
RESOURCE: The importance of a security information event management (SIEM) solution in today’s enterprise is magnified by the growing sophistication of attacks and the use of cloud services increasing the attack surface. In this buyer’s guide, Splunk aims to explain what SIEM is, what it does and how to determine if it’s right for your organization.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

Splunk

Why You Should Take Security In The Cloud
sponsored by Splunk
WHITE PAPER: Advanced security attacks are getting harder to detect as hackers are becoming more sophisticated. Organizations can get ahead of these attacks by adopting a cloud analytics-driven security platform. Register for your complimentary copy of “Why You Should Take Security in the Cloud” and learn how to combat changing security threats.
Posted: 13 Apr 2021 | Published: 13 Apr 2021

Splunk

The 10 Essential Capabilities Of A Best-of-breed Soar
sponsored by Splunk
WHITE PAPER: Security analysts face high alert volumes, an overload of point-products to manage and a shortage of skilled talent. Security orchestration, automation and response (SOAR) tools have served as remedies, but not all of these tools are created equal. In this white paper, Splunk outlines 10 capabilities to look for when evaluating SOAR technology.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

Splunk

How To Stop Firefighting And Make Security Strategic- Long
sponsored by BROADCOM, Inc
RESOURCE: As much as 80% of the world’s mission-critical data resides on mainframes. As such, you must keep yours secure – but an ad-hoc security strategy, deployed by many an enterprise, simply won’t get it done. Download this resource to learn 5 ways to stop day-to-day security battles and construct a real security strategy to secure your mainframe.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

BROADCOM, Inc

FortiSOAR Empowers Security Operations to Accelerate Incident Response
sponsored by Fortinet, Inc.
WHITE PAPER: As enterprises build out their security operations centers (SOCs), they’re finding that their current security installs are more disparate than they thought, tasking them with increasing visibility. But security skills are in short supply. Download this white paper to learn how SOAR can empower your SOC and accelerate incident response.
Posted: 19 Mar 2021 | Published: 12 May 2020

Fortinet, Inc.

The Business Value of iboss cloud Enterprise Security Solutions
sponsored by iBoss
ANALYST REPORT: Throughout digital transformation efforts, enterprises need to keep a close eye on 4 main control points: Identities, applications, data and endpoints. How can you gain visibility without having to rely on legacy security? Download this IDC report to learn experiences that organizations have had using iboss cloud enterprise security solutions.
Posted: 18 Mar 2021 | Published: 31 Jan 2020

iBoss

Security Complexity is Out of Control
sponsored by Fortinet, Inc.
WHITE PAPER: Cybersecurity teams are deploying more solutions – and are getting more data from them – but the resulting picture is not encouraging. Complexity in managing these disparate solutions is overwhelming many security teams that are already overstretched. Download this white paper to investigate 6 challenges caused by security complexity.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Fortinet, Inc.

The Promise of XDR for Effective Threat Detection and Response
sponsored by Fortinet, Inc.
ANALYST REPORT: In a recent ESG survey, a couple of telling conclusions came to light: Detection and response efforts are stressed to a breaking point, and organizations want consolidated and integrated security operations solutions. Extended detection and response (XDR) may be able to help. Access the full ESG report to learn the specific benefits of XDR.
Posted: 17 Mar 2021 | Published: 31 Dec 2020

Fortinet, Inc.

Internal Firewalls for dummies
sponsored by VMware
EBOOK: Although some operating systems are more secure than others, most used today were not designed for security from the ground up, leaving many holes in IT infrastructure as a result. Security teams need to think about compartmentalizing their network to limit damage from intrusions. Leverage this e-book to see how internal firewalls can help.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

VMware

7 Experts on Transitioning to MDR
sponsored by GoSecure
EBOOK: Managed detection and response (MDR) can help you quickly identify and mitigate cyberattacks. But it’s not always clear when a company should move to MDR, nor is it clear how to get the greatest value from an MDR service. In this e-book, hear from 7 security experts as they offer advice to organizations considering MDR.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

GoSecure

Burdens Of Homegrown Customer Identity That Hinder Digital Transformation
sponsored by Okta
WHITE PAPER: When your organization is building to scale, you must place your customers first. Customer identity and access management (CIAM) are the front door to your company’s digital experiences. But many are still using homegrown CIAM, and this puts up roadbloacks to transformation. Dive into this white paper to see why your CIAM may need an update.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

Okta

SIG - SASE in 15 minutes
sponsored by Cisco Umbrella
WEBCAST: Secure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.
Posted: 26 Feb 2021 | Premiered: Mar 25, 2020

Cisco Umbrella

Turning Knowledge into Power
sponsored by Trend Micro
EBOOK: Organizations are working to defend against the volume of evolving cyberthreats plaguing them every day. One critical way to do so is through reading in-depth research that provides access to the methods and means of cybercriminals. Dive into this e-book learn about the 8 critical areas of cybersecurity and threat research.
Posted: 26 Feb 2021 | Published: 26 Feb 2021

Trend Micro

MANAGED XDR - MANAGED DETECTION AND RESPONSE SERVICE
sponsored by Trend Micro
DATA SHEET: Today’s attacks are dangerous – monetizing intellectual property, encrypting essential data for ransom or damaging the flow of information in the case of nation state attacks. Managed extended detection and response (XDR) can provide 24/7 protection from these attacks. View this Trend Micro data sheet to see the full security layer.
Posted: 26 Feb 2021 | Published: 26 Feb 2021

Trend Micro

Leve raging AI to Automate Vulnerability Management
sponsored by Dell SecureWorks
DATA SHEET: Today’s organizations need vulnerability management (VM) solutions that are built to maximize risk reduction. With the power of ML, these same organizations can minimize the manual burden on InfoSec and IT operations teams. Download this data sheet to explore how Secureworks’ VM solution strives to do all this and more.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Dell SecureWorks

The Impact of XDR in the Modern SOC
sponsored by Dell SecureWorks
ANALYST REPORT: Extended detection and response (XDR) is gaining momentum in the security arena. ESG recently surveyed IT/InfoSec professionals across multiple industry verticals to better understand the market perception of XDR, as well as value points and challenges that come with it. Access the full ESG report to see the impact of XDR in the modern SOC.
Posted: 23 Feb 2021 | Published: 30 Nov 2020

Dell SecureWorks

3 Threat Vectors Addressed By Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis
sponsored by Interos
WEBCAST: The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk.
Posted: 23 Feb 2021 | Premiered: Nov 5, 2020

Interos

SolarWinds and the Supply Chain, the Threat We've Ignored for Too Long
sponsored by Interos
WEBCAST: The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.
Posted: 23 Feb 2021 | Premiered: Dec 22, 2020

Interos

How to Become a Threat Hunter
sponsored by Cisco Systems Inc.
EGUIDE: Much of hunting is instinct, and when it comes to hunting cyberthreats, it’s no different. Threat hunters are good at what do because they aren’t as ‘by-the-book’ as other professionals. But they do have a set of learnable skills that make them successful. Download this e-guide featuring Gartner analyst John Collins to know what these skills are.
Posted: 14 Apr 2021 | Published: 07 Apr 2021

Cisco Systems Inc.
1 - 25 of 552 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences