Security Event Management Research
-
Leverage Security Intelligence for Government Agencies
Sponsored by: IBMThis resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
-
Five Steps to Building Visibility and Security Into Your Network
Sponsored by: IxiaDiscover five steps you need to take to not only build visibility and security into your network, but also get the most out of your current monitoring investments.
-
Securing your Midsized Business
Sponsored by: IBMThis guide explores security management strategies and how to combat the growth of sophisticated threats.
-
Your Personal Web Attack Survival Guide
Sponsored by: ImpervaThis white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
-
Make Your SIEM the Best It Can Be: Stepping Up Your SIEM Usage
Sponsored by: TechTarget SecurityReceive expert guidance to maximize your SIEM to its utmost potential. View now to learn how you can optimize your SIEM, ramp up its security capabilities for your enterprise, and how to identify authorized access with SIEM best practices.
-
Security Analytics Security School
Sponsored by: TechTarget SecurityLearn how to develop a customized program that delivers insightful, actionable security analytics. Key points of emphasis include defining success, identifying needs, developing and integrating data sources, and ultimately analyzing information and using it to make smarter security decisions.
-
Information Security Magazine
Sponsored by: TechTarget SecurityIn our inaugural issue of 2014, we look at the top cyberthreats and attack techniques that security professionals are likely to face this year.
-
Select the Right Solution for Endpoint Management
Sponsored by: IBMThis guide explores how you can improve your overall security with endpoint management – ensuring greater visibility with a more unified approach.
-
Delivering Success that Scales with the Largest Enterprises
Sponsored by: IBMThis whitepaper explores one company's comprehensive, cost-effective approach to a customisable security intelligence platform capable of collecting, correlating, and monitoring the highest data volumes.
-
Overview: Comprehensive Security Intelligence Platform
Sponsored by: IBMSecurity management is a top priority of every IT department, but unfortunately these processes are growing more and more complex each day. This guide explores the importance of comprehensive security strategies and how it can smooth businesses processes while ensuring a secure system.
-
Better Security Intelligence for the Finance Industry
Sponsored by: IBMA security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.
-
Scaling Next-Generation Firewalls with Citrix NetScaler
Sponsored by: Citrix and Palo Alto NetworksIT professionals are always looking for new ways to deliver their applications quickly and effectively.This guide outlines next-generation firewalls that can help your network when you need more throughput.
-
A World-class Pediatric Medical Center
Sponsored by: IBMAs data growth skyrockets in hospital information systems, IT departments are realizing the challenge in managing data for compliance while maintaining a secure environment. This guide explores the importance of centralizing your security and compliance management.
-
QRadar Risk Manager: Security Intelligence Keeps You Ahead of Threats
Sponsored by: IBMThis white paper highlights an automated risk management solution that correlates information on asset vulnerabilities and device configurations to better predict risks before they occur.
-
Safeguarding Business in a Time of Expanding and Evolving Cyber Threats
Sponsored by: VerizonThis paper explores how advanced cybersecurity threat management techniques can help companies better prepare for, respond to, and detect advanced cybersecurity threats. It also explores how more advanced cybersecurity threat management capabilities can help organizations detect and respond to threats within days instead of months.
-
6 Steps to SIEM Success
Sponsored by: AT&T CybersecurityIn this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
-
Unlock security success: Is security intelligence the key?
Sponsored by: IBMThis report from Forrester Research takes an inside look at the security intelligence (SI) market, explaining why SI needs to be an IT priority. Also inside, learn about the ongoing challenges that CISOs face, discover the growing interest in security-as-a-service, and more.
-
PCI DSS Simplified: What You Need to Know
Sponsored by: AT&T CybersecurityMaintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.
-
Secure the Extended Enterprise
Sponsored by: TechTarget CIOCIOs and analysts discuss strategies for extending the reach of enterprise security management in this SearchCIO handbook.
-
Detecting Security Breaches and APTs with Big Data Security Analytics
Sponsored by: LogRhythm, Inc.This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
-
A Comprehensive Guide to the Latest Threat Detection Technologies
Sponsored by: TechTarget SecurityThis TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
-
Cyber Security Intelligence Index - Analysis of Cyber Security attack and incident data
Sponsored by: IBMIBM Managed Security Services continuously monitors tens of billions of events per day, and this white paper provides you the opportunity to gain insight into what this data really means. Read on to discover the prevalent types of attacks and attackers and the key factors enabling them.
-
IBM: An Early Leader across the Big Data Security Analytics
Sponsored by: IBMSecurity data collection and analysis has become a big data dilemma – so why wouldn't you adopt a big data approach? This resource outlines why legacy analytics and SIEM tools are inefficient and explores how adopting a solution that combines real-time and asymmetric big data security analytics is vital to success.
-
Information Security Essential Guide: The Evolution of Threat Detection and Management
Sponsored by: TechTarget SecurityThis Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.
-
AlienVault Unified Security Management: Complete Security Visibility
Sponsored by: AT&T CybersecurityAlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.