IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information Management

RSS Feed   
Security Information Management Reports
The SIEM That Gives SIEM a Good Name and Gives Your ROI a Big Boost
sponsored by Empow Cyber Security
RESOURCE: Is your current SIEM platform creating more problems than it solves? Download this resource to find out how you can implement a new SIEM platform to enhance your company's overall security and increase ROI.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Empow Cyber Security

The SIEM that Gives SIEM a Good Name
sponsored by Empow Cyber Security
RESOURCE: Organizations are purchasing more and more security systems due to the increased volume of advanced cyberattacks. While SIEM systems are supposed to help this problem, some aren't meeting expectations. Read on to learn about a new SIEM platform that is used, and loved, by MIT Media Labs and other innovative companies.
Posted: 11 Sep 2018 | Published: 11 Sep 2018

Empow Cyber Security

Donnelley Financial Solutions Case Study
sponsored by Empow Cyber Security
CASE STUDY: Discover how Donnelley Financial Solutions, a global financial risk and compliance provider, was able to meet its security and compliance objectives after adopting a new SIEM strategy.
Posted: 12 Sep 2018 | Published: 12 Sep 2018

Empow Cyber Security

Busting Threat Intelligence Myths: A Guide for Security Pros
sponsored by Recorded Future
WHITE PAPER: There are many misconceptions about what threat intelligence is, leading many security pros to believe that threat intelligence doesn't have an advantage to bring into their particular role. Explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Recorded Future

Asia-Pacific 2018 Cybersecurity: Perceptions & Practices
sponsored by LogRhythm, Inc.
RESEARCH CONTENT: Download the Asia-Pacific 2018 Cybersecurity: Perceptions & Practices survey to learn about the state of security infrastructure for organizations across the globe
Posted: 12 Nov 2018 | Published: 12 Nov 2018

LogRhythm, Inc.

Alert Logic Professional: Intrusion Detection and Log Management
sponsored by Alert Logic
RESOURCE: Learn how your business can benefit from intrusion detection and log management, backed by 24/7 monitoring and threat analysis from certified security experts
Posted: 03 Dec 2018 | Published: 03 Dec 2018

Alert Logic

The Challenge of Building the Right Security Automation Architecture
sponsored by Juniper Networks
RESEARCH CONTENT: This Ponemon research report examines how the use of a security automation architecture is changing the game for cybersecurity. Find out how organizations have already started using automation to improve their security postures.
Posted: 17 Jul 2018 | Published: 30 Jun 2018

Juniper Networks

The Power of SIEM and Incident Response for Improved Cybersecurity
sponsored by IBM Resilient
RESOURCE: Given the growing complexities of the nature of cyberattacks, security teams need a way to respond to alerts in an orchestrated and prescriptive way. Access this resource to uncover how the power of SIEM and incident response combined can improve cybersecurity.
Posted: 22 Mar 2018 | Published: 22 Mar 2018

IBM Resilient

Top 10 Ways to Protect Your Organization from Ransomware
sponsored by Mimecast
RESOURCE: Check out this survival guide for the top 10 ways to protect your organization from ransomware.
Posted: 06 Sep 2018 | Published: 06 Sep 2018


Security Maturity: Mapping the Road to Resilience
sponsored by Dell SecureWorks
EBOOK: Download this e-book for a deep dive into risk and cybersecurity actions all organizations should consider as they think through their security strategy.
Posted: 22 Oct 2018 | Published: 22 Oct 2018

Dell SecureWorks

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement