ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Event Management Research

  • Presentation Transcript: Content Monitoring in the Enterprise

    Sponsored by: Lumension

    This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.

  • Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist

    Sponsored by: TechTarget Security

    Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.

  • 10 Steps for Early Incident Detection

    Sponsored by: Tripwire, Inc.

    The earlier a security breach is detected, the faster an organization can recover. View this informative white paper to learn more about the ten steps to faster detection of security incidents. IT security is only as effective as it's response time, so be sure you're prepared for a breach.

  • Tripwire Log Center Product Brief

    Sponsored by: Tripwire, Inc.

    Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.

  • Smart, Visible and Automated: The New Log Management

    Sponsored by: Tripwire, Inc.

    View this informative white paper to learn more about moving to a more advanced risk protection policy. Improve your log management capabilities by implementing functionality with SIEM, file integrity monitoring and more!

  • Magic Quadrant for Security Information and Event Management

    Sponsored by: Hewlett-Packard Enterprise

    View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data.

  • Four Things You Should Know About Securing Your Growing Business

    Sponsored by: Symantec Corporation

    SMBs may not have the same resources as their enterprise counterparts, but they face the same threats. In the resource, uncover 4 things you should know about securing your growing business and how to protect all points of your organizations more efficiently, without straining your resources.

  • The Security for Business Innovation Council (SBIC) report, 'Getting Ahead of Advanced Threats'

    Sponsored by: EMC Corporation

    In an era of advanced threats, having greater situational awareness is vital for detecting and mitigating attacks. Unfortunately, most organizations lack the capability for intelligence gathering and analysis. In this comprehensive report, gain guidance from top security leaders on how to get ahead with intelligence-driven information security.

  • University of the Sunshine Coast Improves Security with Sentinel

    Sponsored by: NetIQ

    Access this case study to uncover how Sentinel helped one educational institution cost-effectively meet audit requirements for monitoring access to core finance systems, provide simpler access to network resources for users while improving security.

  • Establishing a Formal Cyber Intelligence Capability

    Sponsored by: Verisign, Inc.

    While the benefits of advanced intelligence are substantial, achieving the capability requires a careful planning and consideration. In this paper, uncover best practices and a proven process for establishing a formal cyber intelligence capability as well as explore key considerations.

  • Palo Alto Networks in the Data Center: Eliminating Compromise

    Sponsored by: Palo Alto Networks

    This resource explores best practices for data center network security. Learn how to protect your business without compromising flexibility and application availability.

  • The changing SIEM landscape: What you should know to stay ahead

    Sponsored by: TechTarget Security

    While SIEM systems are often expensive and complex, they play a vital part in your risk and compliance strategy. This technical guide on SIM explores SIEM technologies today and offers exclusive tips and considerations for your deployment.

  • Effective Ways to Search Log Files

    Sponsored by: TechTarget Security

    Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.

  • Presentation Transcript: Balancing compliance with security

    Sponsored by: HP Enterprise Security

    This presentation transcript explores exactly what it means to be secure and compliant, as well as how security information management (SIM) can assist organizations in achieving both.

  • Improving regulatory compliance management through log analysis, SIM

    Sponsored by: HP Enterprise Security

    This E-Guide highlights the importance of log analysis and security information and event management (SIEM) in improving regulatory compliance management.

  • Continuous Monitoring: Responding to New Threats in More Complex IT Environments

    Sponsored by: Tripwire, Inc.

    Governments today are focusing on the practice of continuous monitoring as a means to providing the much needed balance between data access and protection. In this paper, learn more about continuous monitoring, including what is it and why it’s needed, guidelines for implementing it, key capabilities of an effective solution, and more.

  • Tripwire IT Security & Compliance Automation Solutions –Empowering IT Security in an Insecure World

    Sponsored by: Tripwire, Inc.

    In this solution brief, discover how Tripwire IT security and compliance automation solutions provides the visibility, intelligence and automation of IT security controls needed to gain confidence in the protection of your data.

  • E-Guide: Securing the SIEM system: Control access, prioritize availability

    Sponsored by: TechTarget Security

    Given the vital role a security information and event management (SIEM) system plays in an organization’s security infrastructure, a compromised or crashed system can mean devastating consequences. This e-guide explores the serious implications of a corrupted SIEM system and offers helpful tips on how to secure them.

  • IT Decision Checklist: Security Information and Event Management

    Sponsored by: HP Enterprise Security

    As the complexity of the networks IT manages continues to increase, so too does the volume of security-related information generated by network devices. This exclusive e-zine explores the business and technical considerations in selecting the security information management (SIM) tools you need to maintain control.

  • Zero Trust Model: Securing the Extended Enterprise

    Sponsored by: Sophos

    The emergence of new connection options and devices being introduced to the enterprise are extending networks well beyond their controllable boarders. This expert resource offers insight into securing the extended enterprise, exploring the strategy behind Zero Trust Model, creating network security policies for hostile endpoints and more.

  • Technical Guide on SIM: Moving beyond network security toward protecting applications

    Sponsored by: TechTarget Security

    SIMs have been widely adopted for their value in correlating, reporting and alerting on network security. But SIMs can be used for more than just network security monitoring. The same tools can also bring value to application managers if used correctly. In this technical guide, gain 4 steps for integrating applications into enterprise SIMs.

  • Log management best practices

    Sponsored by: TechTarget Security

    Investing in the correct log management tool can ensure that the pressures of maintaining enterprise system log data are greatly decreased. Although the right tool is very helpful, the possibility of it turning into the wrong tool can happen in the blink of an eye if the correct steps are not taken.

  • E-Guide: Selecting a SIM for midmarket business

    Sponsored by: TechTarget Security

    This expert E-Guide discusses the evolvement of SIM tools, differences in deployment processes and top requirements you should consider before making a decision.

  • HP ArcSight Express 3.0

    Sponsored by: HP Enterprise Security.

    View this white paper to explore how to maintain the security of your corporate IT assets by detecting more incidents and addressing larger set of log data with HP ArcSight SIEM solutions.

  • IT Decision Checklist: Antimalware

    Sponsored by: ESET

    Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. This IT Decision Checklist on Antimalware can help you sort through these challenges and offers a list of antimalware products available today.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.