ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:ArcSight, an HP Company

  • 2011 Second Annual Ponemon Cost of Cybercrime Study

    This study quantifies the economic impact of cyber attacks and observes cost trends over time. View now to gain a better understanding of the cost of cyber crime to help your organization determine the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.

  • Second 'Annual Cost of Cyber Crime' Study

    This study quantifies the economic impact of cyber attacks and observes cost trends over time. View now to gain a better understanding of the cost of cyber crime to help your organisation determine the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.

  • Information Security IT Decision Checklist: Security Information and Event Management

    This Information Security IT Decision Checklist explores key business and technical areas you should consider before selecting a security information and event management system. Also included in this guide is a list of SIMs and log management vendors to help in your decision process.

  • Cybersecurity Readiness Study: An Executive Summary

    This study by Ponemon Institute will cover the development of cyber attacks and the development of security systems that can prevent an detect these attacks. It will also tell you when organizations are doing to counter these threats and how you can find out if your organization is prepared for these threats.

  • Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market

    This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.

  • ArcSight Logger: Universal Log Management Solution

    ArcSight Logger is a universal log management solution that unifies searching, reporting, alerting and analysis across any type of enterprise log data - making it unique in its ability to collect, analyze and store massive amounts of data generated by modern networks. Check out this product brief to learn more.

  • First Annual Cost of Cyber Crime Study

    Despite widespread awareness of the impact of cybercrime, cyber attacks continue to occur frequently and result in serious financial consequences for businesses and government institutions.

  • E-Guide: How Risk Management Standards Can Work For Enterprise IT

    Every organisation should be able to articulate how IT threats can harm a business. In this e-guide, Forrester Research Analyst Chris McClean explains how a five-step risk management strategy can add value to the rest of the organisation.

  • E-Guide: Monitoring Strategies for Insider Threat Detection

    Insider threat detection is a vital part of the security of any enterprise organisation. In this guide, learn about the three types of insider crimes and their own set of insider threat detection tactics.

  • E-Guide: Basic Techniques to Prevent Identity Theft and Cybercrime

    When it comes to cybercrime, identity theft techniques often vary from the technical -- computer forensics -- to the old-school -- calling victims to gather personal information. In this guide, our expert covers basic techniques to prevent identity theft.

  • E-Guide A Decision Maker’s Guide to Log Management

    While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.

  • First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies

    The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.