IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed   
Security Event Management Reports
1 - 25 of 650 Matches Previous Page  |  Next Page
CEO Disconnect Is Weakening Cybersecurity
sponsored by Centrify Corporation
RESEARCH CONTENT: As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. This resource offers insights into senior-level thinking on the issue of cybersecurity, including current security priorities and the perceived degree of alignment between threats and solutions.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Centrify Corporation

10 Tips for Selecting a Managed Security Service Provider (MSSP)
sponsored by AlienVault
WHITE PAPER: Many businesses are turning to managed security service providers (MSSPs) to keep up with the constant barrage of cyber threats. Explore this resource to uncover 10 tips for selecting an MSSP.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

AlienVault

Detect Ransomware Before it's Too Late with AlienVault USM Anywhere
sponsored by AlienVault
WEBCAST: Ransomware alone is the fastest growing security threat. Take a look at this webcast to uncover how to detect ransomware before it's too late with a unified security management (USM) strategy.
Posted: 17 Apr 2018 | Premiered: Apr 17, 2018

AlienVault

Forrester Study: The Total Economic Impactâ„¢ of AlienVault USM
sponsored by AlienVault
WHITE PAPER: Based on a 2017 study conducted by the Ponemon Institute, the probability that an organization will experience a breach greater than 1,000 records is 14%. Take a look at this Forester report to gain insight into the impact of unified security management.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

AlienVault

Security Event Monitoring Report
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Organizations are facing increasing pressure to implement security event monitoring to improve threat detection capabilities and address regulatory compliance requirements. Inside this Gartner report uncover key challenges and recommendations for improving SIEM strategies.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

Arctic Wolf Networks, Inc.

Modern-Day Security Tales
sponsored by Cisco Umbrella
RESOURCE: New security programs can be challenging for IT professionals. Take a look at this resource to uncover an easily deployable, reliable, threat intelligence strategy.
Posted: 10 Apr 2018 | Published: 10 Apr 2018

Cisco Umbrella

Ransomware: Everything you Need to Know
sponsored by Cisco & Dimension Data
WHITE PAPER: According to Cisco, a typical ransom can be anywhere from $200 to $10,000, but some institutions have paid a far higher price. Access this resource to uncover everything you need to know about ransomware and protecting your enterprise.
Posted: 03 Apr 2018 | Published: 03 Apr 2018

Cisco & Dimension Data

Seeing the Future is the Future of Cybersecurity
sponsored by Sophos
WEBCAST: In an effort to augment security, many vendors are looking toward transitioning from a reactive approach to a more predictive approach. Take a look at this webcast to gain insight into the future of cybersecurity and how your enterprise can better predict attacks to intercept them before they wreak havoc on your enterprise.
Posted: 02 Apr 2018 | Premiered: Apr 2, 2018

Sophos

Enterprise DNS Security
sponsored by Infoblox
WHITE PAPER: According to an ESG research report, 72% of organizations believe cybersecurity operations have become significantly more difficult over the past 2 years. Explore this white paper to gain insight into enterprise DNS security, its benefits and what to expect for the future of cybersecurity.
Posted: 02 Apr 2018 | Published: 02 Apr 2018

Infoblox

Eliminating Cybersecurity Obscurity Through Continuous Security Validation (Webcast)
sponsored by NSS Labs
WEBCAST: How is your organization defending against security risks? Explore this webcast to learn about how organizations can obtain real time metrics about the effects of risk and security controls to their systems.
Posted: 30 Mar 2018 | Premiered: Mar 27, 2018

NSS Labs

Eliminating Cybersecurity Obscurity Through Continuous Security Validation
sponsored by NSS Labs
PODCAST: How is your organization defending against security risks? Explore this podcast to learn about how organizations can obtain real time metrics about the effects of risk and security controls to their systems.
Posted: 30 Mar 2018 | Premiered: Mar 27, 2018

NSS Labs

Guide to Rethinking Your IT Security
sponsored by VMware
WHITE PAPER: As technology is transforming and becoming more complex, malicious attacks are as well. Take a look at this resource to uncover how to respond to the security challenges of the changing IT landscape.
Posted: 29 Mar 2018 | Published: 29 Mar 2018

VMware

Enabling Cybersecurity in the Age of Digital Transformation
sponsored by VMware
RESEARCH CONTENT: The aspects of digital transformation are changing enterprise IT, enabling greater business agility, but also creating a new set of cybersecurity challenges. This resource explores the impact of digital transformation on cybersecurity processes and technologies and offers strategies for securing modern enterprise IT.
Posted: 28 Mar 2018 | Published: 28 Mar 2018

VMware

Get Started With Open Source Security
sponsored by Flexera Software
RESOURCE: According to Gartner, more than 95% of IT organizations leverage open-source software assets. Utilize this resource to learn how to get started with open source security.
Posted: 23 Mar 2018 | Published: 12 Mar 2018

Flexera Software

6 Steps for Building a Robust Incident Response Function
sponsored by IBM Resilient
WHITE PAPER: Working only to prevent and detect cyberattacks will not protect an enterprise against cybersecurity threats. Access this resource to uncover 3 challenges of building and managing a robust incident response program as well as 6 steps for overcoming these challenges and actually building a program.
Posted: 23 Mar 2018 | Published: 23 Mar 2018

IBM Resilient

The Power of SIEM and Incident Response for Improved Cybersecurity
sponsored by IBM Resilient
RESOURCE: Given the growing complexities of the nature of cyberattacks, security teams need a way to respond to alerts in an orchestrated and prescriptive way. Access this resource to uncover how the power of SIEM and incident response combined can improve cybersecurity.
Posted: 22 Mar 2018 | Published: 22 Mar 2018

IBM Resilient

The Future of Security Operations
sponsored by IBM Resilient
RESOURCE: As technology changes and attack surfaces grow, security teams are forced to think differently. Leverage this resource to learn about the future of security operations and how your team can more effectively operationalize world-class security practices.
Posted: 22 Mar 2018 | Published: 22 Mar 2018

IBM Resilient

Top Global Research Laboratory Resolves Security Incidents Faster
sponsored by IBM Resilient
CASE STUDY: To manage today's threats, organizations need a proven and robust incident response (IR) function. Explore this case study to gain insight into how a top global research laboratory overcame the issue of an inadequate IR ticketing system; it lacked flexibility, control, and security analytics.
Posted: 21 Mar 2018 | Published: 21 Mar 2018

IBM Resilient

Assessing Cybersecurity Success
sponsored by ConvergeOne
WHITE PAPER: How does your organization measure success of cybersecurity? This resource offers a simple and clear way to review and assess your current information security program.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

ConvergeOne

6 Steps to SIEM Success
sponsored by AlienVault
WHITE PAPER: How is your enterprise achieving SIEM success? Whether your goals are to detect threats, achieve compliance, or fuel incident response, this resource will help your SIEM strategy achieve success.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

AlienVault

Incident Response Platform vs. Ticketing System: Why Security Teams Need Purpose Built Technology
sponsored by IBM Resilient
RESEARCH CONTENT: Cybersecurity incident response is imperative in this decade of constant attacks. This Gartner research report explores the differences between incident response platforms vs. ticketing systems and explains the risks and limitations of using a ticketing system for purposes beyond what it was built to do.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

IBM Resilient

Security Predictions for 2018
sponsored by TrendMicro
WHITE PAPER: Ransomware and digital extortion are predicted to be cybercriminals go-to methods of attack in 2018. This resource offers security predictions for 2018 and what your organization should look out for to remain protected.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

TrendMicro

Incident Response Platform
sponsored by IBM Resilient
WHITE PAPER: How does your organization plan to respond to complex cyber threats? Learn how an incident response platform can significantly drive down the mean time to find, respond to, and remediate incidents.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

IBM Resilient

Spectre and Meltdown Podcast
sponsored by RSA Conference
PODCAST: Spectre and Meltdown have the potential to affect personal computers, mobile devices, and cloud infrastructure dating back to 1995. Listen to this podcast to hear Paul Kocher's expert take on the Spectre and Meltdown cyberthreats as well as tips and insights into protecting your sensitive data from the attacks.
Posted: 19 Mar 2018 | Premiered: Mar 19, 2018

RSA Conference

The Third Annual Study on the Cyber Resilient Organization
sponsored by IBM Resilient
RESEARCH CONTENT: According to Ponemon Institute's Cyber Resilient Organization Study, 65% reported the severity of attacks has increased. Explore the results of the report to uncover where organizations stand in terms of achieving cyber resilience.
Posted: 19 Mar 2018 | Published: 19 Mar 2018

IBM Resilient
1 - 25 of 650 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement