IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information Management

RSS Feed   
Security Information Management Reports
 
Security Orchestration, Automation and Response (SOAR) for MSSPs
sponsored by Swimlane
WHITE PAPER: Success and growth in the MSSP business requires balancing the delivery on multiple customer service level agreements (SLAs) with cost-effective operations. But, advances in SOAR offer MSSPs a number of ways to meet SLAs, improve response times and deliver better security. In this white paper, learn more about the potential of SOAR for MSSPs.
Posted: 18 Apr 2019 | Published: 18 Apr 2019

Swimlane

2019 Cyberthreat Defense Report
sponsored by Gigamon
RESOURCE: Download this infographic to uncover some key findings from CyberEdge Group's 6th annual Cyberthreat Defense Report.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Gigamon

Closing the People, Processes and Technology Gap: How Innovation Can Strengthen Your Cybersecurity Program
sponsored by Optiv
RESOURCE: A robust security model is built on 3 pillars—people, processes and technology. Unfortunately, a failure to innovate could negatively affect your ability to excel at all 3. In this blog, explore these 3 pillars and discover 5 steps to solving the people, process and technologies equation.
Posted: 05 Aug 2019 | Published: 24 Jul 2019

Optiv

Cybersecurity Effectiveness Podcast: Malcolm Harkins
sponsored by Verodin
PODCAST: In this podcast, Cylance Chief Security and Trust Officer Malcolm Harkins reflects on his core leadership philosophies and the processes he implements to cultivate a professional culture of excellence. Listen as he discusses his transition from working at Intel, to joining the cybersecurity start-up, Cylance.
Posted: 29 Aug 2019 | Premiered: Aug 29, 2019

Verodin

Endpoint Protection Buyers Guide
sponsored by CrowdStrike
WHITE PAPER: Endpoint security is one of the most critical components of a cybersecurity strategy. Unfortunately, for those responsible for protecting their organizations' endpoints, it has never been more challenging to select the best solution for the job. In this white paper, discover an evaluation of endpoint protection platforms based on 5 key elements.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

9 Common Security Mistakes Your Organization Might Be Making
sponsored by Involta
WHITE PAPER: Without cybersecurity practices in place, a company could risk up to $4.43 million in breach costs, according to the Ponemon/IBM 2018 Cost of a Data Breach Study. Most companies should be very concerned about their security practices. In this white paper, explore 9 security mistakes that are commonly made over and over again.
Posted: 21 May 2019 | Published: 21 May 2019

Involta

Choosing the Right Endpoint Security Controls for your Security Lifecycle
sponsored by Symantec
ANALYST REPORT: In the modern world of cloud-enabled digital transformation initiatives, endpoint security has gained importance. Download this report for key points to consider when evaluating endpoint security software such as endpoint protection and endpoint detection and response.
Posted: 21 Aug 2019 | Published: 30 Apr 2019

Symantec

CrowdStrike Incident Response and Proactive Services
sponsored by CrowdStrike
WHITE PAPER: CrowdStrike's incident response and proactive services are architected to enable organizations to quickly and effectively react to a cybersecurity incident. In this white paper, learn how CrowdStrike Services can help organizations secure and mature their security by addressing 3 fundamental questions.
Posted: 09 May 2019 | Published: 09 May 2019

CrowdStrike

Now on Now: Accelerating Security Operations
sponsored by ServiceNow
WHITE PAPER: Most companies manage security incident response with a manual process. This creates confusion and reduces the visibility an organization has. In this white paper, learn how with the Security Incident Response application of ServiceNow Security Operations, organizations can automate alert processing and accelerate their incident response process.
Posted: 24 May 2019 | Published: 30 Jun 2018

ServiceNow

5 Principles of Effective IT Security
sponsored by VMware
WHITE PAPER: Keeping data, applications, and devices secure has always been a top priority for IT security professionals. In order to do this, IT security teams should focus on reducing their attack surface to make their applications less vulnerable to attacks. In this white paper, explore 5 core principles to an effective application security strategy.
Posted: 17 Jun 2019 | Published: 30 Apr 2019

VMware
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement