IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed   
Security Event Management Reports
1 - 25 of 648 Matches Previous Page  |  Next Page
Expanding the Threat Intelligence Horizon
sponsored by Phantom Cyber
VIDEO: How is your organization defending and responding to threats? Explore this webcast to uncover an automated threat hunting and response cyber defense approach, which includes a cloud assisted security strategy and integrated security strategies.
Posted: 23 Feb 2018 | Premiered: 21 Feb 2018

Phantom Cyber

How to Prepare for Cyber Threats in 2018
sponsored by Proofpoint, Inc.
VIDEO: Network-propagating ransomware caused at least $5 billion in losses in 2017, according to Proofpoint. Explore this webcast to uncover a look back into 2017's cyber threats, 2018 threat predictions and top cybersecurity recommendations to protect your organization.
Posted: 23 Feb 2018 | Premiered: 21 Feb 2018

Proofpoint, Inc.

Getting Started with DMARC
sponsored by Proofpoint, Inc.
EBOOK: According to Proofpoint, phishing costs brands around the globe $4.5 billion each year. This e-book reveals what DMARC is, how it works, its benefits, and what it means to your organization.
Posted: 23 Feb 2018 | Published: 23 Feb 2018

Proofpoint, Inc.

Integrating Human and Technological Elements in your Security Strategy
sponsored by Kaspersky Lab
WHITE PAPER: Cybercrime damages are expected to cost the world $6 trillion by 2021, according to CSO. This resource offers strategies for protecting your business from the ever-changing threat landscape.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Kaspersky Lab

Why a Unified Approach to IT and OT Network Security is Critical
sponsored by Skybox Security
WHITE PAPER: One of the biggest security challenges organizations are struggling with is limited visibility of the IT-OT attack surface. This white paper examines the challenges, implications and benefits of a unified approach to managing security in converged IT and OT networks.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Skybox Security

Freedom Security Alliance Dramatically Accelerates Security Response Services
sponsored by ServiceNow
CASE STUDY: Explore this case study to gain insight into how Freedom Security Alliance (FSA) improved their cybersecurity strategy by accelerating security response services.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

ServiceNow

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
WEBCAST: According to a Ponemon Institute study, 59% of respondents believe cyber automation will reduce operating costs and 55% believe it will reduce personnel cost. This webcast offers insight into reducing cybersecurity costs through automation technologies.
Posted: 16 Feb 2018 | Premiered: Feb 16, 2018

Juniper Networks

What to Know about SIEM as a Service
sponsored by LogRhythm, Inc.
EGUIDE: Recently, SIEM products residing in cloud environments have caught the attention of users looking to improve their security posture. In this e-guide, expert Frank Siemons touches upon SIEM as a service and what you need to know before deploying this approach.
Posted: 15 Feb 2018 | Published: 06 Feb 2018

LogRhythm, Inc.

User Behavior Analysis & SIEM
sponsored by LogRhythm, Inc.
EGUIDE: In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis.
Posted: 15 Feb 2018 | Published: 07 Feb 2018

LogRhythm, Inc.

How to Improve SIEM Systems with Machine Learning
sponsored by LogRhythm, Inc.
EGUIDE: In this e-guide, security expert Karen Scarfone dives into how machine learning can improve the effectiveness of SIEM systems.
Posted: 15 Feb 2018 | Published: 07 Feb 2018

LogRhythm, Inc.

Crafting a Cybersecurity Incident Response Plan, Step by Step
sponsored by SearchSecurity.com
EBOOK: Is your cybersecurity incident response plan the best it can be? Inside this expert handbook, Johna Till Johnson, Rob Shapland and Mike Villegas uncover step by step instructions to crafting an effective incident response plan and cloud incident response plan for your organization.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

SearchSecurity.com

AV Replacement Guide
sponsored by CrowdStrike
RESOURCE: This guide is designed to help security professionals who are considering replacing their current antivirus and/or endpoint protection programs.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

CrowdStrike

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
ANALYST REPORT: In this 32-page Ponemon Institute report, learn how organizations are deploying security technologies that augment or replace human intervention, along with the benefits of automation and their cost effectiveness.
Posted: 12 Feb 2018 | Published: 30 Nov 2017

Juniper Networks

Cyber Threat Protection Platform
sponsored by NSS Labs
RESOURCE: Enterprise defenses are constantly being challenged by attackers who are morphing tactics and adopting new evasion techniques at a record pace. This resource offers strategies for continuous security validation and cyber risk protection.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

NSS Labs

System Risk Identification
sponsored by NSS Labs
RESOURCE: Organization attack surfaces are large and complex, making it impossible to protect against everything all of the time. This resource offers strategies for assessing the impact of unmitigated risks and how to focus on the real attack surface.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

NSS Labs

Security Control Effectiveness
sponsored by NSS Labs
RESOURCE: According to NSS Labs survey of CISOs in North America, 52% of enterprises see no "value-add" from their currently deployed security products. This resource offers an approach to security control effectiveness and will assist you in evaluating the performance of security defenses as well as reveal unmitigated risks.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

NSS Labs

Visibility, Detection and Control for Industrial Networks
sponsored by SecurityMatters
RESOURCE: This resource reveals how to improve network security with strategies such as visibility, threat detection capabilities and control.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

SecurityMatters

How to Align with the NIST Cybersecurity Framework
sponsored by SecurityMatters
EBOOK: Many organizations are embracing the NIST Cybersecurity Framework to manage their cybersecurity risks. This e-book reveals how to align with the NIST Cybersecurity Framework, the 3 components of the framework and its benefits.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

SecurityMatters

Economic, Operational & Strategic Benefits of Security Framework Adoption
sponsored by Tenable, Inc.
EBOOK: What are the business and security benefits that come from adopting a security framework? In this 96-page e-book, 38 information security leaders share success perspectives and lessons learned regarding their security framework.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Tenable, Inc.

Economics of Insecurity
sponsored by Cylance
WHITE PAPER: Traditional AV companies don't want to help you prevent attacks. They want to help you react to breaches - so they can sell you more solutions with every intrusion. It's all part of the "Economics of Insecurity". Tired of the status quo and investing in more of the same old technology? Learn why it's time to think beyond the stack.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Cylance

How to Use Micro-Segmentation to Secure Your Organization
sponsored by Illumio
WHITE PAPER: Protecting the network perimeter is not enough. Organizations looking to secure the interior of their environments often need to be more dynamic and granular than network segmentation will allow. This resource reveals how micro-segmentation can secure environments by reducing attack surfaces, hardening data centers, and enabling cloud security.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Illumio

The SIEM Buyer's Guide
sponsored by Splunk
RESOURCE: How have SIEM platforms evolved? This SIEM Buyer's Guide reveals the differences between modern SIEM and legacy SIEM and offers 9 technical capabilities of a modern SIEM strategy and how it can improve your overall security.
Posted: 31 Jan 2018 | Published: 31 Jan 2018

Splunk

End-User Security Survey: How Common is Confidential File Sharing?
sponsored by Dell and Intel
RESEARCH CONTENT: To find out how widespread the unsafe sharing of confidential data has become, Dell commissioned a global survey of 2,608 professionals who handle confidential data at companies with 250 or more employees. Click inside to learn the results.
Posted: 26 Jan 2018 | Published: 29 Dec 2017

Dell and Intel

4 Easy Ways Central Logging Improves Security Posture
sponsored by Splunk
WHITE PAPER: Reliable central logging or log management is the first critical step toward gaining visibility across a multi-layered security environment. This resource reveals how to gain immediate visibility into critical security incidents with 4 basic sources that security teams can leverage along with central logging.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Splunk

Damage Control
sponsored by Splunk
RESOURCE: According to a Splunk research report, the total mean cost of a critical incident is $141,628. Explore this research report to gain insight into damage control strategies and the impact of critical IT incidents within your organization.
Posted: 26 Jan 2018 | Published: 31 Dec 2017

Splunk
1 - 25 of 648 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement