ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Event Management Research

  • 5 Principles of Effective IT Security

    Sponsored by: VMware

    Keeping data, applications, and devices secure has always been a top priority for IT security professionals. In order to do this, IT security teams should focus on reducing their attack surface to make their applications less vulnerable to attacks. In this white paper, explore 5 core principles to an effective application security strategy.

  • The Total Economic Impact Of Alert Logic SIEMless Threat Management

    Sponsored by: Alert Logic

    Many companies struggle to assemble the right combination of tools and expertise to provide their own security and secure their clients' applications and data in public cloud and hybrid environments. In this Forrester Consulting TEI study, evaluate Alert Logic's ability to help companies solve these problems.

  • How to Capitalize on the Multi-billion Dollar Market for Managed Security Services

    Sponsored by: IBM

    Tune into this webcast to discover the advantages of partnering with IBM Security to capitalize on the managed security services market opportunities and multi-billion dollar revenue therein.

  • Aeris and ROAMWORKS: Protecting Cargo from Security Challenges

    Sponsored by: Aeris

    To assist Dubai Airports achieve its goals, ROAMWORKS, with the help of Aeris, provided an end-to-end platform that enabled airport management to monitor, track, manage, and control their asset data around the world. In this case study, learn more about ROAMWORKS and Aeris' partnership and how they can help protect cargo from security challenges.

  • MSSP Buyer's Guide: Grow Your Managed SOC Business with IBM Security

    Sponsored by: IBM

    This eBook outlines the benefits of IBM Security's MSSP Partner Program and explains how their threat detection and response solutions can help you capitalize on this unique market opportunity. Download now to learn how this program can help you scale your growth and increase your revenue potential.

  • Integrating Threat Intelligence into Endpoint Security

    Sponsored by: CrowdStrike

    As the threat landscape continues to change security teams need all the help they can get to more effectively prevent, detect and respond to threats. In this white paper, learn how incorporating a threat intelligence platform, like CrowdStrike's Falcon X, into the detection and response workflow could help to significantly enhance investigations.

  • Endpoint Protection Buyers Guide

    Sponsored by: CrowdStrike

    Endpoint security is one of the most critical components of a cybersecurity strategy. Unfortunately, for those responsible for protecting their organizations' endpoints, it has never been more challenging to select the best solution for the job. In this white paper, discover an evaluation of endpoint protection platforms based on 5 key elements.

  • Ivanti Cloud: Real Time Insights and Recommendations

    Sponsored by: Ivanti ANZ

    Ivanti Cloud identifies risks and opportunities enterprise-wide, then recommends and automates next steps. In this resource, explore the benefits of Ivanti Cloud.

  • ServiceNow Security Operations Infographic

    Sponsored by: ServiceNow

    Download this Forrester Total Economic Impact infographic for a summary of interview findings from 3 customers about their experience using ServiceNow Security Operations.

  • Cybersecurity Analytics and Operations in Transition

    Sponsored by: Dell SecureWorks

    Threat prevention isn't enough, as cyberthreats can circumvent threat defenses, compromise IT assets, and lead to extensive damages. This is where threat detection and response come into play. In this research report, review an assessment of organizations' cybersecurity analytics and operations plans, successes, and struggles.

  • Your Endpoint Security Strategy Needs a Hug

    Sponsored by: Verizon

    Traditional endpoint security has long been a crutch in the fight against hackers, but it just doesn't cut it anymore. Those tools rely on known malware signatures to be effective but they can't defend against zero-day attacks and new ransomware variants. In this blog post, discover 5 areas that you can address to ease your endpoint suffering.

  • Threat-Driven Multifactor Authentication (MFA)

    Sponsored by: Silverfort

    In this solution brief, learn how Check Point and Silverfort have partnered to deliver dynamic threat-driven authentication. With this integration, any threat detected by Check Point is leveraged by Silverfort's policy engine to trigger step-up authentication in real-time.

  • Now on Now: Accelerating Security Operations

    Sponsored by: ServiceNow

    Most companies manage security incident response with a manual process. This creates confusion and reduces the visibility an organization has. In this white paper, learn how with the Security Incident Response application of ServiceNow Security Operations, organizations can automate alert processing and accelerate their incident response process.

  • The Critical Role of Endpoint Detection and Response

    Sponsored by: Trend Micro, Inc.

    Conventional security solutions are useful and provide some level of protection. However, surveys find that the current level of protection is simply not adequate. In this Osterman Research report, explore why many organizations are deploying endpoint detection and response technologies as a supplement to their existing security defenses.

  • Security Maturity: Mapping the Road to Resilience in Europe

    Sponsored by: Dell SecureWorks

    The road to cybersecurity maturity can be tricky. This is because there isn't one universal standard by which management can determine how well the risk is being managed. For European organizations, reviewing the highlights in this white paper can provide clues for comparing their own cybersecurity maturity to that of other EMEA organizations.

  • 8 Essential Elements of a Comprehensive IT Security Strategy

    Sponsored by: Involta

    IT security measures should be at the forefront of every business owner's mind. Improving cybersecurity to prevent data loss and protect critical business and financial data is essential. In this white paper, explore 8 elements that play an important role in developing and maintaining secure IT environments.

  • Secureworks Red Cloak Threat Detection and Response Application

    Sponsored by: Dell SecureWorks

    Threat prevention isn't enough, as cyberthreats can circumvent threat defenses, and compromise IT assets. This is where threat detection and response come into play. The tools used for these tasks are referred to as security analytics and operations. In this research report, explore the state of the security analytics and operations market.

  • 9 Common Security Mistakes Your Organization Might Be Making

    Sponsored by: Involta

    Without cybersecurity practices in place, a company could risk up to $4.43 million in breach costs, according to the Ponemon/IBM 2018 Cost of a Data Breach Study. Most companies should be very concerned about their security practices. In this white paper, explore 9 security mistakes that are commonly made over and over again.

  • Security Automation with Ansible

    Sponsored by: Red Hat

    Configuring systems and applications to make life more difficult for attackers is daunting. In this webcast, learn how using the agentless, push-based power of Red Hat Ansible Automation to apply and enforce security standards can help organizations adapt to meet internal and external security guidelines.

  • Real-Time Mainframe SIEM 101

    Sponsored by: BMC

    SIEM systems have been the industry standard for enterprise network security, but the mainframe has been left out of this predominantly distributed discipline. In this white paper, learn how to launch a mainframe SIEM initiative. Also explore 4 steps to ensure malicious mainframe activity triggers a notification to the appropriate security system.

  • Top 5 Critical Alerts You Need for IT Security

    Sponsored by: ManageEngine

    Analyzing log data and identifying which security events are of concern among thousands of routine events can be a challenge, especially if you aren't sure which events to track. In this white paper, explore a list of 5 critical events your organization should be on the lookout for.

  • The Basics of Auditing and Securing Your Network Perimeter with SIEM

    Sponsored by: ManageEngine

    To thwart network attacks, you first need to be on top of critical security events occurring in your network. But due to the high volume of events, auditing these events in real time can be challenging, if not impossible. In this white paper, learn about the basics of auditing and securing your network perimeter by leveraging SIEM.

  • A Best Practice Guide to Mitigating Ransomware in Your Enterprise

    Sponsored by: ManageEngine

    One of the most lethal forms of cyberattacks, ransomware, can disrupt the most powerful institutions in the world, from government organizations to Fortune 500 companies. In this white paper, learn 4 simple best practices that your organization can implement to help prevent ransomware attacks.

  • Cybersecurity Incident Response Services

    Sponsored by: CrowdStrike

    According to Forrester Analytics 2018 survey data, 50% of global security decision makers reported suffering at least one breach in the past 12 months. Pragmatic businesses plan for a breach. In this Forrester Wave report, explore key criteria to look for when evaluating a cybersecurity incident response service provider.

  • CrowdStrike Incident Response and Proactive Services

    Sponsored by: CrowdStrike

    CrowdStrike's incident response and proactive services are architected to enable organizations to quickly and effectively react to a cybersecurity incident. In this white paper, learn how CrowdStrike Services can help organizations secure and mature their security by addressing 3 fundamental questions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.