IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed   
Security Event Management Reports
26 - 50 of 651 Matches Previous Page  |  Next Page
Open Source Security and Compliance: Trends to Act on in 2018
sponsored by Flexera Software
WEBCAST: According to a Forrester report, 45% of firms say they suffered a breach as a result of an external attack, with software vulnerabilities and web applications as the top methods of attack. This webcast reveals the shift in open source security and compliance while outlining how to remain secure and compliant in the upcoming year.
Posted: 13 Mar 2018 | Premiered: Mar 13, 2018

Flexera Software

Open Source Security in 2017: Lessons Learned for the New Year
sponsored by Flexera Software
WEBCAST: The usage of open source software has changed dramatically in the past year. Leverage this webcast to learn about the usage and awareness of open source software in 2017 and how to better prepare for software security in 2018.
Posted: 13 Mar 2018 | Premiered: Mar 13, 2018

Flexera Software

Magic Quadrant for SIEM
sponsored by IBM
RESEARCH CONTENT: Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's security information and event management (SIEM) products as well as a market overview.
Posted: 08 Mar 2018 | Published: 08 Mar 2018

IBM

Wimbledon Increases Security to Focus on the Court, not the Cloud
sponsored by IBM
WEBCAST: The Wimbledon website sees a 300% increase in cyberattacks year after year. Take a look at this webcast case study to uncover how Wimbledon is fighting back against hackers by implementing a strategy that has significantly reduced the number of breaches.
Posted: 08 Mar 2018 | Premiered: Mar 8, 2018

IBM

SIEM Mid-Market Analysis
sponsored by AlienVault
RESOURCE: SIEM serves 3 important functions: proving compliant practices, formalizing data storage, and initiating breach investigation. Explore this Frost & Sullivan Mid-Market Analysis to uncover how vendors stack up with their SIEM strategies.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

AlienVault

2018 Global Threat Report
sponsored by CrowdStrike
RESEARCH CONTENT: According to CrowdStrike's 2018 Global Threat Report, 39% of all incidents in 2017 were malicious software that went undetected by traditional antivirus. This report reveals 2018 global threat predictions and dives into 3 key cybersecurity findings of 2017 to help prepare your enterprise for the threats to come.
Posted: 06 Mar 2018 | Published: 06 Mar 2018

CrowdStrike

Cybersecurity in Financial Services: A Complex Threat Requiring a Comprehensive Strategy
sponsored by Wombat Security Technologies
WHITE PAPER: Cybersecurity problems are getting worse overtime, so strategies in place need to constantly be updated. This Osterman Research white paper offers a multi-dimensional view of the complex cybersecurity landscape that financial firms and professionals face.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

Wombat Security Technologies

Case Study: Sports Industry Company Overcomes Cybersecurity Issues
sponsored by enSilo
CASE STUDY: Take a look at this case study to uncover how a company within the sports industry overcame the issue of falling victim to damaging cyberattacks causing downtime by implementing a security strategy with limited resources.
Posted: 28 Feb 2018 | Published: 28 Feb 2018


Food & Beverage Security Case Study
sponsored by enSilo
CASE STUDY: Companies are beginning to realize that the traditional AV is not enough to protect their data from the ever-changing threat landscape. Explore this case study to gain insight into how a beverage company was able to overcome their issue of preventing ransomware attacks.
Posted: 27 Feb 2018 | Published: 27 Feb 2018


Ransomware Security Protection
sponsored by enSilo
WHITE PAPER: The constant modification of ransomware variants is causing a severe threat for financial institutions worldwide. Take a look at this resource to uncover a malware protection security strategy to ensure all endpoints are secure from harmful attacks.
Posted: 27 Feb 2018 | Published: 27 Feb 2018


Advanced Threat Protection Integration
sponsored by Phantom Cyber
VIDEO: How is your enterprise protecting against looming threats? Explore this webcast with Phantom and Symantec to gain insight into integrating an advanced threat protection strategy to detect, investigate and respond to threats.
Posted: 26 Feb 2018 | Premiered: 21 Feb 2018

Phantom Cyber

Security Automation & Orchestration
sponsored by Phantom Cyber
VIDEO: Explore this webcast with Phantom and Palo Alto Networks to uncover a security automation strategy that can help improve network security, advanced endpoint protection, cloud security and more.
Posted: 26 Feb 2018 | Premiered: 21 Feb 2018

Phantom Cyber

Expanding the Threat Intelligence Horizon
sponsored by Phantom Cyber
VIDEO: How is your organization defending and responding to threats? Explore this webcast with Phantom and McAfee to uncover an automated threat hunting and response cyber defense approach, which includes a cloud assisted security strategy and integrated security strategies.
Posted: 23 Feb 2018 | Premiered: 21 Feb 2018

Phantom Cyber

How to Prepare for Cyber Threats in 2018
sponsored by Proofpoint, Inc.
VIDEO: Network-propagating ransomware caused at least $5 billion in losses in 2017, according to Proofpoint. Explore this webcast to uncover a look back into 2017's cyber threats, 2018 threat predictions and top cybersecurity recommendations to protect your organization.
Posted: 23 Feb 2018 | Premiered: 21 Feb 2018

Proofpoint, Inc.

Integrating Human and Technological Elements in your Security Strategy
sponsored by Kaspersky Lab
WHITE PAPER: Cybercrime damages are expected to cost the world $6 trillion by 2021, according to CSO. This resource offers strategies for protecting your business from the ever-changing threat landscape.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Kaspersky Lab

Why a Unified Approach to IT and OT Network Security is Critical
sponsored by Skybox Security
WHITE PAPER: One of the biggest security challenges organizations are struggling with is limited visibility of the IT-OT attack surface. This white paper examines the challenges, implications and benefits of a unified approach to managing security in converged IT and OT networks.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Skybox Security

Freedom Security Alliance Dramatically Accelerates Security Response Services
sponsored by ServiceNow
CASE STUDY: Explore this case study to gain insight into how Freedom Security Alliance (FSA) improved their cybersecurity strategy by accelerating security response services.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

ServiceNow

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
WEBCAST: According to a Ponemon Institute study, 59% of respondents believe cyber automation will reduce operating costs and 55% believe it will reduce personnel cost. This webcast offers insight into reducing cybersecurity costs through automation technologies.
Posted: 16 Feb 2018 | Premiered: Feb 16, 2018

Juniper Networks

What to Know about SIEM as a Service
sponsored by LogRhythm, Inc.
EGUIDE: Recently, SIEM products residing in cloud environments have caught the attention of users looking to improve their security posture. In this e-guide, expert Frank Siemons touches upon SIEM as a service and what you need to know before deploying this approach.
Posted: 15 Feb 2018 | Published: 06 Feb 2018

LogRhythm, Inc.

User Behavior Analysis & SIEM
sponsored by LogRhythm, Inc.
EGUIDE: In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis.
Posted: 15 Feb 2018 | Published: 07 Feb 2018

LogRhythm, Inc.

How to Improve SIEM Systems with Machine Learning
sponsored by LogRhythm, Inc.
EGUIDE: In this e-guide, security expert Karen Scarfone dives into how machine learning can improve the effectiveness of SIEM systems.
Posted: 15 Feb 2018 | Published: 07 Feb 2018

LogRhythm, Inc.

Crafting a Cybersecurity Incident Response Plan, Step by Step
sponsored by SearchSecurity.com
EBOOK: Is your cybersecurity incident response plan the best it can be? Inside this expert handbook, Johna Till Johnson, Rob Shapland and Mike Villegas uncover step by step instructions to crafting an effective incident response plan and cloud incident response plan for your organization.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

SearchSecurity.com

AV Replacement Guide
sponsored by CrowdStrike
RESOURCE: This guide is designed to help security professionals who are considering replacing their current antivirus and/or endpoint protection programs.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

CrowdStrike

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
ANALYST REPORT: In this 32-page Ponemon Institute report, learn how organizations are deploying security technologies that augment or replace human intervention, along with the benefits of automation and their cost effectiveness.
Posted: 12 Feb 2018 | Published: 30 Nov 2017

Juniper Networks

2018 Cybersecurity Report
sponsored by Cisco Systems, Inc.
RESOURCE: Defenders should prepare to face new, self-propagating, network-based threats in 2018. Explore this 68-page cybersecurity report to uncover what to expect in 2018 and how to augment your current security approach to protect against the modern day threats.
Posted: 15 Mar 2018 | Published: 15 Mar 2018

Cisco Systems, Inc.
26 - 50 of 651 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement