ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Event Management Research

  • Kaspersky Lab’s COVID-19 Relief Initiatives

    Sponsored by: Kaspersky

    Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.

  • A Guide to SIEM Platforms, Benefits and Features

    Sponsored by: TechTarget Security

    SIEM systems enable organizations to centralize indecent response, detection and handling, as well as data logging for compliance. This e-guide is a collection of resources highlighting SIEM benefits, criteria and tools. Read on to evaluate which SIEM system is right for you.

  • SIEM Tools, Future Tech and How to Prepare for What's Ahead

    Sponsored by: Sumo Logic AWS

    While security tech is evolving, so are the threats. Current IT staffs are feeling overwhelmed and some experts believe AI is the answer. Gartner, however, claims that AI will never be perfect, and SIEM will always need a human touch. In this e-book, look at current SIEM tools, future tech and how to prepare for what’s ahead.

  • Cybersecurity: The Latest Battleground for MSPs

    Sponsored by: SkOUT

    Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.

  • Who Needs Security Orchestration, Automation and Response?

    Sponsored by: TechTarget Security

    Who needs SOAR? The understaffed security team. Or put it another way: most security teams. In this SOAR guide, our expert contributor providers a detailed list of potential uses and details of what SOAR can do to boost the security of an organization's systems and data.

  • The State of Cybersecurity and How It Will Evolve

    Sponsored by: ALTR

    Download this e-guide for an exclusive Q&A with Raluca Ada Popa. Popa is equipped with four degrees from Massachusetts Institute of Technology, two research fellowships and a bevy of awards and merits. In this Q&A Popa discusses the future of data security and the challenges of ensuring adequate defense.

  • Incident response playbook in flux as services, tools arrive

    Sponsored by: TechTarget Security

    The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.

  • What to Know about SIEM as a Service

    Sponsored by: LogRhythm, Inc.

    Recently, SIEM products residing in cloud environments have caught the attention of users looking to improve their security posture. In this e-guide, expert Frank Siemons touches upon SIEM as a service and what you need to know before deploying this approach.

  • User Behavior Analysis & SIEM

    Sponsored by: LogRhythm, Inc.

    In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis.

  • How to Improve SIEM Systems with Machine Learning

    Sponsored by: LogRhythm, Inc.

    In this e-guide, security expert Karen Scarfone dives into how machine learning can improve the effectiveness of SIEM systems.

  • SIEM Analyst Research Bundle

    Sponsored by: AT&T Cybersecurity

    No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.

  • Cisco ASA 5500 Series Adaptive Security Appliances

    Sponsored by: Cisco Systems, Inc.

    Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.

  • Six Criteria for Buying Data Loss Prevention Products

    Sponsored by: InteliSecure

    Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.

  • Introduction to Data Loss Prevention Tools

    Sponsored by: InteliSecure

    In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.

  • SSL: Get the Best for You and Mitigate Vulnerabilities

    Sponsored by: A10 Networks

    Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.

  • Your IIoT Security Plan: Risks in Manufacturing

    Sponsored by: Bayshore Networks

    In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.

  • How to Resolve a Web Application Security Vulnerability

    Sponsored by: Veracode, Inc.

    Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.

  • Application Development Security Requires Forethought

    Sponsored by: Veracode, Inc.

    Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.

  • Resolve Web Security Issues with Industry Experts' Advice

    Sponsored by: Veracode, Inc.

    Learn how to bridge the communication divide between app developers and security pros, as well as foster secure coding practices in your enterprise to mitigate the vulnerabilities in your web applications.

  • How to Effectively Manage the Cloud Logs of Security Events

    Sponsored by: Splunk

    Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.

  • Comparing Top Shelf Email Encryption Software Products

    Sponsored by: Hewlett Packard Enterprise

    Access this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.

  • Incident Response Tools Can Help Automate Your Security

    Sponsored by: ModoModo

    A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.

  • Top Mobile Security Threats: Insight Into Threats and Attackers

    Sponsored by: Lookout

    Discover how IT can tackle the top modern mobile security threats by identifying vulnerabilities, integrating successfully with the cloud, and more.

  • Incident Response Tools Can Help Automate Your Security

    Sponsored by: Cisco Umbrella and Dimension Data

    In this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.

  • 7 Elements of Cybersecurity Readiness

    Sponsored by: Cisco Umbrella and Dimension Data

    Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.