Security Event Management Multimedia
-
Enterprise Security and your Technology
Sponsored by: Hewlett Packard EnterpriseThis informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
-
From SIEM to Security Analytics: The Path Forward
Sponsored by: EMC CorporationWatch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
-
Unified Security Management: Real-time Threat Detection
Sponsored by: AT&T CybersecurityThis free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
-
Security Analytics Security School
Sponsored by: TechTarget SecurityLearn how to develop a customized program that delivers insightful, actionable security analytics. Key points of emphasis include defining success, identifying needs, developing and integrating data sources, and ultimately analyzing information and using it to make smarter security decisions.
-
6 Steps to SIEM Success
Sponsored by: AT&T CybersecurityIn this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
-
PCI DSS Simplified: What You Need to Know
Sponsored by: AT&T CybersecurityMaintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.
-
Detecting Security Breaches and APTs with Big Data Security Analytics
Sponsored by: LogRhythm, Inc.This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
-
AlienVault Unified Security Management: Complete Security Visibility
Sponsored by: AT&T CybersecurityAlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
-
Practitioners Guide to Establishing a SOC Webinar
Sponsored by: AT&T CybersecurityThis AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
-
Expect More From Your SIEM
Sponsored by: AT&T CybersecurityUnlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.
-
Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
Sponsored by: ArcSight, an HP CompanyThis webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
-
LogRhythm 3-Minute Product Demo
Sponsored by: LogRhythm, Inc.This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
-
Ethical Hacking and Risk Assessments
Sponsored by: Global KnowledgeAttend this webcast to learn about risk assessment process and tools used by ethical hackers.
-
GFI EventsManager
Sponsored by: GFI SoftwareGFI EventsManager collects data from all devices that use Windows event logs, W3C, and Syslog and applies the best rules and filtering in the industry to identify key data.
-
GFI LANguard Security Event Log Monitor - Downloads
Sponsored by: GFI SoftwareGFI LANguard S.E.L.M. ships with a security event analysis engine which takes into account the type of security event, security level of each computer, when event occurred, role of computer and its operation system.