IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information and Event Management

RSS Feed   
Security Information and Event Management Reports
 
A Risk-Adaptive Approach to Dynamic Data Protection
sponsored by Forcepoint
VIDEO: Data protection can halt a security organization and productive work. Today, security teams are bogged down with alerts – but they don't have to be. Tune into this webinar to see how this data protection system uses human-centric behavior analytics to continuously determine the risk users pose, based on their actions.
Posted: 04 Feb 2019 | Premiered: 04 Feb 2019

TOPICS: 
Forcepoint

The SIEM Buyer's Guide
sponsored by Splunk
WHITE PAPER: Download this buyer's guide for the 'who, what, where, when, and why' of buying an analytics-driven SIEM.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

TOPICS: 
Splunk

Cloud Based Asset Management
sponsored by Axonius
RESOURCE: When companies move to cloud instances like Amazon ECS/EKS/EC2, and Microsoft Azure, they are often faced with a compromise. They realize the reliability, flexibility, and cost savings of the cloud often sacrifice the security and visibility they have invested in for on-premise assets. In this infographic, learn how Axonius can help.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Axonius

Fast-Growing AppsFlyer Automates Security Policy Validation with Axonius
sponsored by Axonius
CASE STUDY: In this case study, learn about how AppsFlyers used the Axonius platform to automate their security policy validation. With a comprehensive inventory of all assets, users, and security solutions, AppsFlyer was able to get clear visibility into the deployment of the different security solutions and automate ongoing security policy adherence.
Posted: 22 Jan 2019 | Published: 22 Jan 2019

TOPICS: 
Axonius

Market Guide for User and Entity Behavior Analytics
sponsored by Forcepoint
RESEARCH CONTENT: Security and risk management leaders considering UEBA will find that the market has fragmented, with a few pure-play vendors and a wide set of traditional security products that embed core UEBA technologies and features. Read on to see what Gartner has to say about the matter in this informative market guide.
Posted: 05 Feb 2019 | Published: 23 Apr 2018

TOPICS: 
Forcepoint

Forcepoint Dynamic Data Protection
sponsored by Forcepoint
PRODUCT OVERVIEW: Learn how you can protect assets based on risk level of actors and the value of data by using endpoint and user behavioral analytics today.
Posted: 06 Feb 2019 | Published: 06 Feb 2019

TOPICS: 
Forcepoint

4 Easy Ways Central Logging Improves Security Posture
sponsored by Splunk
WHITE PAPER: Reliable central logging or log management is the first critical step toward gaining visibility across a multi-layered security environment. This resource reveals how to gain immediate visibility into critical security incidents with 4 basic sources that security teams can leverage along with central logging.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

TOPICS: 
Splunk

The 1st Step to Zero Trust: Asset Management for Cybersecurity
sponsored by Axonius
WHITE PAPER: 8 years after the Zero Trust model was introduced, the concept has hit the mainstream. A Forrester analyst says 85% of his calls involve zero trust. With the amount of interest in the concept, many organizations are rushing to understand how to implement it. In this white paper, learn the first step to implementing zero trust: asset management.
Posted: 21 Jan 2019 | Published: 21 Jan 2019

TOPICS: 
Axonius

The SIEM That Gives SIEM a Good Name and Gives Your ROI a Big Boost
sponsored by Empow Cyber Security
RESOURCE: Is your current SIEM platform creating more problems than it solves? Download this resource to find out how you can implement a new SIEM platform to enhance your company's overall security and increase ROI.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

TOPICS: 
Empow Cyber Security

The Business Case for Investing in a Security Ratings Platform
sponsored by Security Scorecard
WHITE PAPER: Data breaches caused by third-party vendor relationships are on the rise. Unfortunately, most assessment techniques are point-in-time and only express a vendor's cyber health at a particular moment. In this white paper, learn how a security ratings platform can help companies to monitor changes in the health of their vendor ecosystems.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
Security Scorecard
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement