Security Event Management Research
-
Swiss Army Knife Security? How to Vet Integrated Tool Sets
Sponsored by: TechTarget SecurityIn this issue of Information Security magazine, we look at the changing delivery models for cybersecurity tools as more vendors offer multi-tool platforms and services. Let us help you make sense of it all with advice on tool consolidation.
-
Is it time for a DLP system in your enterprise?
Sponsored by: TechTarget SecurityData loss prevention technology is a mature security control whose role is growing as DLP systems are made to respond to mobile and cloud technology in the enterprise.
-
Keep Your Data Secure: Fighting Back With Flash
Sponsored by: Micron TechnologySelf-encrypting drives (SEDs) provide the last line of defense, protecting critical data stored at the endpoints. Discover how SEDs satisfy regulations and compliance, lower TCO, increase IT efficiency, and, of course, secure data while preventing a potential data breach due to lost or stolen devices.
-
Fighting Cybercrime in the 21st Century
Sponsored by: TechTarget SecurityStrengthen your security with these expert insights into fighting advanced crimeware.
-
Information Security Magazine – The Hunt for Data Analytics
Sponsored by: TechTarget SecurityBig data and analytics show promise for better threat detection. Should these technologies be combined with SIEM products, or is it time to move beyond these high alert systems?
-
Resolve to Revitalize Your SIEM Security
Sponsored by: IBMThis expert guide explores some of the latest developments in SIEM technology and how you can best take advantage of them.
-
Secure VDI Desktops the Same Way you Would Physical Ones
Sponsored by: DellDownload this expert resource now to learn about protecting your virtual desktops and much more.
-
How to Properly Plan Against Attacks with Incident Response and Advanced Malware Protection
Sponsored by: TaaSeraThis expert e-guide explores the dos and don'ts of creating an incident response plan and looks at how advanced malware uses your own network against you.
-
Secure Mobile Email for the Lean IT Department
Sponsored by: Shavlik TechnologiesThis expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
-
Cost of a Breach Rising; How to Protect Against It
Sponsored by: TaaSeraThis expert e-guide explores how the Target breach of 2013 has changed the way organizations approach security.
-
How to Use Threat Intelligence with SIEM Products
Sponsored by: LogRhythm, Inc.This expert e-guide will teach you how to use security information and event management to protect your organization from evolving threats.
-
Study on Cybercrime's Cost to Business
Sponsored by: Hewlett Packard EnterpriseThis exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
-
How to Deal with Increasing DDOS Attacks
Sponsored by: Verisign, Inc.This expert e-guide explores how to protect your organization from distributed denial of service attacks.
-
Endpoint protection: Whitelisting and Beyond
Sponsored by: TechTarget SecurityApplication whitelisting is a valuable security tool but it's riddled with complexity. This handbook takes a look at whitelisting capabilities, with an eye to the NIST cybersecurity framework and suggests best practices for implementing or managing a whitelist in your enterprise.
-
6 Ways Hackers Try to Break Secure Sockets Layer-Encrypted Data
Sponsored by: Symantec & Blue Coat SystemsHow do hackers break through secure sockets layer-encrypted data exactly? This expert e-guide has the answer, exploring six common methods these cyber-criminals use.
-
Extending Security Intelligence with Big Data
Sponsored by: IBMLearn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
-
How SIEM Helps IT Security, Compliance, Operations and Management
Sponsored by: CDW CorporationSecurity information and event management (SIEM) tools offer more than just security. In fact, many organizations overlook some of the most useful aspects of SIEM technology, including fraud prevention and operations management. In this expert resource, discover the value of SIEM tools for four different audiences.
-
Top 5 Truths About Big Data Hype and Security Intelligence
Sponsored by: Hewlett Packard EnterpriseThis resource outlines the top five truths behind the Big Data hype and explains why Big Data Security Analytics (BDSA) is the future of security intelligence. Read on to learn how it offers the insight you need to perform real-time threat detection and defense.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Sponsored by: TechTarget SecurityBigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
Extending Security Intelligence with Big Data
Sponsored by: IBMThis white paper introduces a security solution that applies big data capabilities to help organizations to keep pace with today's advanced threats and prevent attacks before they happen.
-
Operationalizing Information Security: Top 10 SIEM Implementer’s Checklist
Sponsored by: AccelOps Inc.This informative whitepaper outlines 10 best practices for successful SIEM implementation.
-
Enterprise Security and your Technology
Sponsored by: Hewlett Packard EnterpriseThis informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
-
Lake Health Enhances Patient Experience with HP ArcSight
Sponsored by: Hewlett Packard EnterpriseUncover the SIEM a healthcare provider put in place which helped them take a proactive approach to information security, mitigate anomalies, increase visibility, ensure regulatory compliance, and more!
-
Banca Intesa Counters Threats with HP ArcSight
Sponsored by: Hewlett Packard EnterpriseExplore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure.
-
TELUS leverages HP ArcSight and TippingPoint
Sponsored by: Hewlett Packard EnterpriseThis informative whitepaper explores how managed security service providers are utilizing effective intelligent analysis for their SIEM solutions.