IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information and Event Management

RSS Feed   
Security Information and Event Management Reports
 
Eliminating Cybersecurity Obscurity Through Continuous Security Validation (Webcast)
sponsored by NSS Labs
WEBCAST: How is your organization defending against security risks? Explore this webcast to learn about how organizations can obtain real time metrics about the effects of risk and security controls to their systems.
Posted: 30 Mar 2018 | Premiered: Mar 27, 2018

NSS Labs

Intrusion Detection Systems (IDS)
sponsored by Armor
WHITE PAPER: In this white paper, learn about 2 different Intrusion Detection Systems (IDS) that can analyze and correlate all security events, and trigger further investigation by a Security Operations Center when necessary.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Armor

The Cloud Generation: A Perfect Storm of Security Challenges
sponsored by Symantec
WHITE PAPER: As cloud adoptions increase, organizations are realizing that securing their data is a lot harder. Some organizations are looking to secure web gateways (SWGs) to help fight off threats. Download this report to learn about SWGs and properly securing your organization in the cloud generation.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Symantec

Aiming for a Flawless Approach to Fraud
sponsored by Riskified
RESEARCH CONTENT: Take a look inside this report to learn more about insights into cosmetics shopping patterns and fraud trends, and best practices for effectively handling transactions without compromising users' shopping experience and safety.
Posted: 09 Aug 2018 | Published: 09 Aug 2018

Riskified

Incident Response: Are You Ready?
sponsored by Cisco Umbrella
EBOOK: Is your organization ready in the case of an incident or threat? Download this e-book for insights into building and strengthening your organization's incident response plan.
Posted: 29 Aug 2018 | Published: 28 Aug 2018

Cisco Umbrella

Unified Security Management vs. SIEM: A Technical Comparison
sponsored by AlienVault
RESOURCE: Take a look at a different approach to the typical SIEM technology and learn what options organizations have besides SIEM, the history of SIEM, and more.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

AlienVault

How Italy's Largest Service Provider Leverages Security
sponsored by Cisco Umbrella
CASE STUDY: In this case study, find out how Telecom Italia (TIM) was able to keep more than half a million business customers safe, while having a competitive advantage and an incremental revenue opportunity in the process.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

Cisco Umbrella

Playbook Fridays: Forcing Active Directory (AD) Password Resets via ThreatConnect Victims
sponsored by ThreatConnect
RESOURCE: This blog post highlights an intelligence driven orchestration platform that automates almost any cybersecurity task, runs in real time, and provides you with detail information about each run. Find out how this platform can integrate with your active directory service to detect attacks and prevent damaging breaches.
Posted: 11 Oct 2018 | Published: 08 May 2018

ThreatConnect

Guide to Rethinking Your IT Security
sponsored by VMware
WHITE PAPER: As technology is transforming and becoming more complex, malicious attacks are as well. Take a look at this resource to uncover how to respond to the security challenges of the changing IT landscape.
Posted: 29 Mar 2018 | Published: 29 Mar 2018

VMware

The Internet Never Forgets: How to Reduce Your Organization's Attack Surface and Cyber Risk with Digital Risk Reconnaissance
sponsored by IntSights
WEBCAST: Join guest speakers, Nick Hayes, Forrester's Senior Security and Risk Analyst, along with Alon Arvatz, Chief Product Officer and Co-Founder of IntSights, for a discussion on the importance of Digital Risk Protection for enterprise security, compliance and risk teams.
Posted: 01 Aug 2018 | Premiered: Jul 30, 2018

IntSights
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement