IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed   
Security Event Management Reports
1 - 25 of 628 Matches Previous Page  |  Next Page
How a Security Expert Defends Your Network's Blind Spots
sponsored by Arctic Wolf
WEBCAST: Find out why having a security expert on your IT team makes a measurable difference in your network's defense and learn about Arctic Wolf's security operations center as a service (SOCaaS).
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Arctic Wolf

Why You Should Take Security in the Cloud
sponsored by Splunk
WHITE PAPER: This white paper highlights the benefits of running a security analytics platform in the cloud and explores the power of big data analytics and cloud-based security.
Posted: 29 Jun 2018 | Published: 29 Dec 2017

Splunk

The SIEM Buyer's Guide: The Who, What, Where, When and Why of Buying an Analytics-Driven Security Solution
sponsored by Splunk
RESOURCE: In this buyer's guide, learn what a SIEM solution is, what it isn't, it's evolution, what it does and how to determine if it is the right security solution for your organization.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

Splunk

Dwell Time as a Critical Security Success Metric
sponsored by Armor
WHITE PAPER: Find out how security professionals can more accurately measure and report on dwell times so that they can identify when a threat enters their environment and work to remediate it faster.
Posted: 15 Jun 2018 | Published: 15 Jun 2018

Armor

AI and Machine Learning: The Security Perspective
sponsored by Splunk
WHITE PAPER: Machine learning is making great strides in security. Access this white paper for a closer look at how AI and machine learning can make an impact on IT and security.
Posted: 09 May 2018 | Published: 09 May 2018

Splunk

Detect Ransomware Before it's Too Late with AlienVault USM Anywhere
sponsored by AlienVault
WEBCAST: Ransomware alone is the fastest growing security threat. Take a look at this webcast to uncover how to detect ransomware before it's too late with a unified security management (USM) strategy.
Posted: 17 Apr 2018 | Premiered: Apr 17, 2018

AlienVault

Forrester Study: The Total Economic Impactâ„¢ of AlienVault USM
sponsored by AlienVault
WHITE PAPER: Based on a 2017 study conducted by the Ponemon Institute, the probability that an organization will experience a breach greater than 1,000 records is 14%. Take a look at this Forester report to gain insight into the impact of unified security management.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

AlienVault

Modern-Day Security Tales
sponsored by Cisco Umbrella
RESOURCE: New security programs can be challenging for IT professionals. Take a look at this resource to uncover an easily deployable, reliable, threat intelligence strategy.
Posted: 10 Apr 2018 | Published: 10 Apr 2018

Cisco Umbrella

Eliminating Cybersecurity Obscurity Through Continuous Security Validation (Webcast)
sponsored by NSS Labs
WEBCAST: How is your organization defending against security risks? Explore this webcast to learn about how organizations can obtain real time metrics about the effects of risk and security controls to their systems.
Posted: 30 Mar 2018 | Premiered: Mar 27, 2018

NSS Labs

Eliminating Cybersecurity Obscurity Through Continuous Security Validation
sponsored by NSS Labs
PODCAST: How is your organization defending against security risks? Explore this podcast to learn about how organizations can obtain real time metrics about the effects of risk and security controls to their systems.
Posted: 30 Mar 2018 | Premiered: Mar 27, 2018

NSS Labs

Guide to Rethinking Your IT Security
sponsored by VMware
WHITE PAPER: As technology is transforming and becoming more complex, malicious attacks are as well. Take a look at this resource to uncover how to respond to the security challenges of the changing IT landscape.
Posted: 29 Mar 2018 | Published: 29 Mar 2018

VMware

Enabling Cybersecurity in the Age of Digital Transformation
sponsored by VMware
RESEARCH CONTENT: The aspects of digital transformation are changing enterprise IT, enabling greater business agility, but also creating a new set of cybersecurity challenges. This resource explores the impact of digital transformation on cybersecurity processes and technologies and offers strategies for securing modern enterprise IT.
Posted: 28 Mar 2018 | Published: 28 Mar 2018

VMware

6 Steps for Building a Robust Incident Response Function
sponsored by IBM Resilient
WHITE PAPER: Working only to prevent and detect cyberattacks will not protect an enterprise against cybersecurity threats. Access this resource to uncover 3 challenges of building and managing a robust incident response program as well as 6 steps for overcoming these challenges and actually building a program.
Posted: 23 Mar 2018 | Published: 23 Mar 2018

IBM Resilient

The Power of SIEM and Incident Response for Improved Cybersecurity
sponsored by IBM Resilient
RESOURCE: Given the growing complexities of the nature of cyberattacks, security teams need a way to respond to alerts in an orchestrated and prescriptive way. Access this resource to uncover how the power of SIEM and incident response combined can improve cybersecurity.
Posted: 22 Mar 2018 | Published: 22 Mar 2018

IBM Resilient

The Future of Security Operations
sponsored by IBM Resilient
RESOURCE: As technology changes and attack surfaces grow, security teams are forced to think differently. Leverage this resource to learn about the future of security operations and how your team can more effectively operationalize world-class security practices.
Posted: 22 Mar 2018 | Published: 22 Mar 2018

IBM Resilient

Top Global Research Laboratory Resolves Security Incidents Faster
sponsored by IBM Resilient
CASE STUDY: To manage today's threats, organizations need a proven and robust incident response (IR) function. Explore this case study to gain insight into how a top global research laboratory overcame the issue of an inadequate IR ticketing system; it lacked flexibility, control, and security analytics.
Posted: 21 Mar 2018 | Published: 21 Mar 2018

IBM Resilient

Incident Response Platform vs. Ticketing System: Why Security Teams Need Purpose Built Technology
sponsored by IBM Resilient
RESEARCH CONTENT: Cybersecurity incident response is imperative in this decade of constant attacks. This Gartner research report explores the differences between incident response platforms vs. ticketing systems and explains the risks and limitations of using a ticketing system for purposes beyond what it was built to do.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

IBM Resilient

Security Predictions for 2018
sponsored by TrendMicro
WHITE PAPER: Ransomware and digital extortion are predicted to be cybercriminals go-to methods of attack in 2018. This resource offers security predictions for 2018 and what your organization should look out for to remain protected.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

TrendMicro

Incident Response Platform
sponsored by IBM Resilient
WHITE PAPER: How does your organization plan to respond to complex cyber threats? Learn how an incident response platform can significantly drive down the mean time to find, respond to, and remediate incidents.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

IBM Resilient

Spectre and Meltdown Podcast
sponsored by RSA Conference
PODCAST: Spectre and Meltdown have the potential to affect personal computers, mobile devices, and cloud infrastructure dating back to 1995. Listen to this podcast to hear Paul Kocher's expert take on the Spectre and Meltdown cyberthreats as well as tips and insights into protecting your sensitive data from the attacks.
Posted: 19 Mar 2018 | Premiered: Mar 19, 2018

RSA Conference

The Third Annual Study on the Cyber Resilient Organization
sponsored by IBM Resilient
RESEARCH CONTENT: According to Ponemon Institute's Cyber Resilient Organization Study, 65% reported the severity of attacks has increased. Explore the results of the report to uncover where organizations stand in terms of achieving cyber resilience.
Posted: 19 Mar 2018 | Published: 19 Mar 2018

IBM Resilient

Threat Territory
sponsored by RSA Conference
RESOURCE: This resource offers insight into the ever-growing internet of threats through expert tips and startling facts to get you up to speed with the damaging threats you need to look out for and system vulnerabilities you could be missing.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

RSA Conference

SIEM Mid-Market Analysis
sponsored by AlienVault
RESOURCE: SIEM serves 3 important functions: proving compliant practices, formalizing data storage, and initiating breach investigation. Explore this Frost & Sullivan Mid-Market Analysis to uncover how vendors stack up with their SIEM strategies.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

AlienVault

Cybersecurity in Financial Services: A Complex Threat Requiring a Comprehensive Strategy
sponsored by Wombat Security Technologies
WHITE PAPER: Cybersecurity problems are getting worse overtime, so strategies in place need to constantly be updated. This Osterman Research white paper offers a multi-dimensional view of the complex cybersecurity landscape that financial firms and professionals face.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

Wombat Security Technologies

2018 Cybersecurity Report
sponsored by Cisco Systems, Inc.
RESOURCE: Defenders should prepare to face new, self-propagating, network-based threats in 2018. Explore this 68-page cybersecurity report to uncover what to expect in 2018 and how to augment your current security approach to protect against the modern day threats.
Posted: 15 Mar 2018 | Published: 15 Mar 2018

Cisco Systems, Inc.
1 - 25 of 628 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement