IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed   
Security Event Management Reports
1 - 25 of 456 Matches Previous Page  |  Next Page
The Role of Breach and Attack Simulation
sponsored by Cymulate
VIDEO: The volume of data breaches and cyberattacks are continuing to rise. As a result, organizations are relying on breach and attack simulation tools to provide more consistent and automated validation of controls. In this video, Tim Ager from Cymulate discusses today's cyberthreats landscape and the rise of breach and attack simulation tools.
Posted: 23 Aug 2019 | Premiered: 23 Aug 2019

Cymulate

10 Questions to Answer Before Adopting SaaS SIEM
sponsored by LogRhythm, Inc.
ANALYST REPORT: SaaS-like options for leveraging SIEM technologies are becoming more common. Download this Gartner research report to explore a series of questions that should be asked and answered when considering SaaS SIEM to determine if it's an appropriate option for your organization.
Posted: 23 Aug 2019 | Published: 05 Nov 2018

LogRhythm, Inc.

Market Guide for User and Entity Behavior Analytics
sponsored by LogRhythm, Inc.
ANALYST REPORT: Security and risk management leaders considering UEBA are finding that the market keeps shifting away from pure-play vendors, toward a wider set of traditional security products that embed core UEBA technologies and features. Download this Gartner report to learn more.
Posted: 23 Aug 2019 | Published: 21 May 2019

LogRhythm, Inc.

Choosing the Right Endpoint Security Controls for your Security Lifecycle
sponsored by Symantec
ANALYST REPORT: In the modern world of cloud-enabled digital transformation initiatives, endpoint security has gained importance. Download this report for key points to consider when evaluating endpoint security software such as endpoint protection and endpoint detection and response.
Posted: 21 Aug 2019 | Published: 30 Apr 2019

Symantec

Top 10 North American Bank Eliminates Credential Stuffing
sponsored by Shape Security
CASE STUDY: A Big 5 Canadian bank had been suffering from automated attacks on its web and mobile login applications for months. Bad actors were performing credential stuffing attacks on all possible channels. In this case study, learn how Shape's Enterprise Defense service and Threat Intelligence team were able to successfully defend against these attacks.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Shape Security

The SIEM Buyer's Guide for 2020
sponsored by Splunk
WHITE PAPER: The importance of a SIEM solution in today's enterprise is magnified by the growing sophistication of attacks and the use of cloud services which only increases the attack surface. In this buyer's guide, learn everything you need to know about a SIEM including what it is, its evolution and how to determine if it is right for your organization.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

Splunk

BrickStor Encryption & Key Management Capabilities
sponsored by RackTop Systems
DATA SHEET: Download this datasheet to learn about BrickStor, a CyberConverged solution with advanced encryption and key management capabilities that automatically protect your data and ensure continuous compliance without corruption.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

RackTop Systems

How to Pick a Winner in EDR
sponsored by Palo Alto Networks
ANALYST REPORT: The MITRE Corporation conducted an independent test of the detection and investigation capabilities of leading endpoint detection and response (EDR) products against real-world attack sequences. This research report will break down the results and what it means for your organization as you assess your endpoint security toolkit.
Posted: 12 Aug 2019 | Published: 21 Jun 2019

Palo Alto Networks

Transparent Data Movement Solution Overview
sponsored by RackTop Systems
DATA SHEET: Download this paper for a sneak-peek at a Transparent Data Movement (TDM) tool that intelligently and seamlessly moves data between performance tiers and more economical tiers of storage, without disruption, to lower TCO—all under the constant protection of policy-based security and compliance.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

RackTop Systems

Security Gets Smart with AI
sponsored by Blackberry Cylance
ANALYST REPORT: In this research report, explore key findings from a SANS survey of cybersecurity professionals who are involved with or interested in the use of AI for improving the security of their organization.
Posted: 09 Aug 2019 | Published: 31 Mar 2019

Blackberry Cylance

CyberConverged Data Storage
sponsored by RackTop Systems
DATA SHEET: Read the following paper to learn about a CyberConverged network-attached storage (NAS) solution which fuses scalable capacity and performance with advanced data security and compliance capabilities. Details on how it works, benefits, and cost savings are included inside.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

CyberConverged Storage Designed for the Creative Process
sponsored by RackTop Systems
DATA SHEET: Read this datasheet to catch a glimpse of a security-integrated storage solution—CyberConverged Storage—designed to unify data protection during every phase of the creative process—from capture to post-production.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

CyberConverged Storage: An Overview
sponsored by RackTop Systems
DATA SHEET: Download this datasheet to discover a solution that integrates security and compliance, data management workflows, and high-performance storage to neutralize threats in every area of the infrastructure.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

Getting a Handle on Data Exposure
sponsored by RackTop Systems
DATA SHEET: The following datasheet shares a solution that simplifies the process of sourcing your data and reporting on who has access to it on a continuous basis. Download now to learn how to use it to eliminate data redundancy and overexposure – a critical step in protecting data and reducing the footprint of security problems.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

Machine Learning in Security
sponsored by Micro Focus
WEBCAST: In this webcast, Mario Daigle, VP of Product for Interset, a Micro Focus company, discusses 2 main categories of machine learning—supervised and unsupervised—and how they can be applied practically in the context of solving cybersecurity problems.
Posted: 08 Aug 2019 | Premiered: Aug 8, 2019

Micro Focus

Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
sponsored by Forcepoint
WEBCAST: Some approaches to information security simply won't deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy. In this webcast, Doug Landoll discusses how to take a risk-first approach to addressing information security.
Posted: 07 Aug 2019 | Premiered: Aug 7, 2019

Forcepoint

Evolution of ICS Attacks and the Prospects for Future Disruptive Events
sponsored by Dragos
WHITE PAPER: Headlines are full of proclamations covering the latest in industrial control system (ICS) attacks and threats to critical infrastructure. In this white paper, explore an analysis of ICS disruptive events from the past 4 years. Also, learn how these threats have evolved over time, and what measures are necessary to defeat them.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Dragos

Closing the People, Processes and Technology Gap: How Innovation Can Strengthen Your Cybersecurity Program
sponsored by Optiv
RESOURCE: A robust security model is built on 3 pillars—people, processes and technology. Unfortunately, a failure to innovate could negatively affect your ability to excel at all 3. In this blog, explore these 3 pillars and discover 5 steps to solving the people, process and technologies equation.
Posted: 05 Aug 2019 | Published: 24 Jul 2019

Optiv

Insights into Building an Industrial Control System Security Operations Center
sponsored by Dragos
WHITE PAPER: One of the most dedicated focuses towards security that can be implemented in an ICS is a security operations center (SOC). In this white paper, learn how best practices from enterprise IT SOCs can be adapted to focus on ICS environments.
Posted: 05 Aug 2019 | Published: 31 Mar 2017

Dragos

Dragos Industrial Cybersecurity Platform
sponsored by Dragos
VIDEO: The industrial security community faces strategic challenges in responding to cyberthreats. In this video, learn about Dragos' industrial cybersecurity platform which helps ICS defenders to identify assets, detect threats and respond via investigation playbooks.
Posted: 02 Aug 2019 | Premiered: 11 Nov 2018

Dragos

Be the Disrupter, Not the Disrupted
sponsored by Micro Focus & DXC Technology
RESOURCE: On the journey to digitally transform your business, don't forget the essentials: enterprise security and risk management. After all, disrupting the status quo with better business outcomes requires not falling prey to disruptions from cyberthreats. In this infographic, learn the top challenges in cyberthreat defense and how you can overcome them.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Micro Focus & DXC Technology

The 4 Types of Threat Detection
sponsored by Dragos
WHITE PAPER: Threat detection comprises 1 of the 3 core cybersecurity functions along with prevention and response. But, detection plays an outsized role as arguably the most important cybersecurity function in an "assume breach" world. In this white paper, explore the 4 types of threat detection, how they are derived and the uses for each.
Posted: 01 Aug 2019 | Published: 13 Jul 2018

Dragos

SOCs vs. AFCs: What's the Difference?
sponsored by Optiv
RESOURCE: Advances in technology have often been perceived as threats rather than opportunities, due to the reactionary nature of the SOC model. But, Advanced Fusion Centers (AFCs) offer a modern approach to cybersecurity replacing this reactive model with an agile one. In this blog, explore the differences between SOCs and AFCs.
Posted: 01 Aug 2019 | Published: 23 Jul 2019

Optiv

Using Wire Data for Security Forensics
sponsored by Viavi
WHITE PAPER: Security threats and attacks are growing in number and becoming increasingly more malicious, posing a severe threat to business survival. This white paper explains the means and importance of moving to a full wire data collection and enhancement strategy for both NetOps and SecOps operational and forensic capabilities.
Posted: 09 Jul 2019 | Published: 31 Mar 2019

Viavi

Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE: Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019

SkOUT
1 - 25 of 456 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement