Security Event Management Research
-
10 Ways to Build a Better Big Data Security Strategy
Sponsored by: Hewlett-Packard EnterpriseThis informative whitepaper explores the role of Big Data and outlines 10 best practices for Big Data security.
-
Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
Sponsored by: IBMThis white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
-
Cybersecurity Is Every CIO's Problem
Sponsored by: TechTarget CIOThis CIO handbook gives you the knowledge you need to create cybersecurity that not only keeps you safe, but also builds trust among consumers and other businesses.
-
4 Secrets to Meaningful Security Discussions with the Board of Directors
Sponsored by: CitrixThis informative whitepaper outlines 4 helpful hints for meaningful security discussions with your Board of Directors.
-
Navigating Today's DDoS Landscape
Sponsored by: IxiaLearn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.
-
Testing the Cloud: Definitions, Requirements, and Solutions
Sponsored by: IxiaTesting of cloud services has some familiar aspects and some new challenges. Gain an understanding of the risks in the cloud, and how to safeguard your organization.
-
A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
Sponsored by: IBMThis informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
-
Detecting and Preventing Retail Cyber Crime
Sponsored by: LogRhythm, Inc.Continue on to this important whitepaper now to learn how to properly instrument and monitor for anomalous activity. Also discover a security intelligence platform that can directly monitor endpoints and much more.
-
Retail Cyber Crime
Sponsored by: LogRhythm, Inc.This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
-
The Critical Incident Response Maturity Journey
Sponsored by: EMC CorporationThis paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
-
From SIEM to Security Analytics: The Path Forward
Sponsored by: EMC CorporationWatch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
-
A Roadmap for Big Data in Security Analytics
Sponsored by: EMC CorporationStarting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
-
Transforming Traditional Security Strategies into an Early Warning System for Advanced Threats
Sponsored by: EMC CorporationTo develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
-
The Big Data Security Analytics Era is Here
Sponsored by: EMC CorporationBig data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
-
Evaluating the True Impact of Fraud on Financial Institution
Sponsored by: IBMThis guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
-
A UK Security Provider Fortifies its Systems for Greater Resiliency
Sponsored by: IBMThis informative case study explores one company's success with a disaster recovery plan and how it sought business continuity while ensuring security.
-
Deciphering the truth about Big Data hype and security intelligence
Sponsored by: Hewlett-Packard EnterpriseIn this whitepaper, Randy Franklin Smith of UltimateWindowsSecurity.com discusses the key tenets of the realationship between Big Data and security information and event management.
-
Buyer's Criteria for Next-Generation Network Security
Sponsored by: SourcefireThis whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
-
Unified Security Management: Real-time Threat Detection
Sponsored by: AT&T CybersecurityThis free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
-
How to Protect the Increasingly Vulnerable Energy Industry
Sponsored by: IBMLearn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
-
Secunia Vulnerability Review 2014
Sponsored by: SecuniaThis guide reviews vulnerabilities for 2014 and discusses key figures and facts from a global IT security perspective.
-
Early Leaders Across the Big Data Security Analytics Continuum
Sponsored by: IBMThis informative white paper defines and discusses big data security analytics, including the continuum between real-time and asymmetric big data security analytics solutions.
-
Information Security ASEAN March 2014
Sponsored by: TechTarget SecurityThis ezine looks at the security challenges facing IT security professionals in the ASEAN region with a look at threats and industry trends.
-
Information Security ANZ March 2014
Sponsored by: TechTarget SecurityThis issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
-
Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
Sponsored by: IBMThis white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.