Security MonitoringWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Browse Directory>   Infrastructure and Systems ManagementSecurity SolutionsSecurity Monitoring  What is RSS?
Advertisement

ALL RESULTS
  1 - 25 of 399 | Next Page

Security for a Faster World: Issue 3 by Hewlett-Packard Limited

October 21, 2013 - (Free Research)
Experts discuss the most pressing security trends and the methods needed to keep critical assets safe today. 
(WHITE PAPER) READ ABSTRACT |

SANS Analyst Report: The Risks with Mobility and BYOD by Hewlett-Packard Limited

March 30, 2012 - (Free Research)
Businesses are migrating to a more mobile environment. Individuals use mobile apps and devices are used for both personal and business reasons. With today's workforce relying on mobility and apps, they can create a riskier environment for valuable information. 
(WHITE PAPER) READ ABSTRACT |

The Detrimental Cost of Cyber Crime by Hewlett-Packard Limited

October 25, 2013 - (Free Research)
In this analyst report by Ponemon Institute, see how cybercrime has continued to bring heavy economic damage to U.K. companies, and what they should do to reduce such detrimental impact. 
(ANALYST REPORT) READ ABSTRACT |

Case Study: Deploying the Best SIEM System Available by Hewlett-Packard Limited

April 30, 2013 - (Free Research)
Uncover the SIEM a security service provider uses to help them achieve real-time visibility and control over their systems and services to increase intelligence, protection, and safety. 
(CASE STUDY) READ ABSTRACT |

Improving Windows Client Performance and Security: An Impact Comparison of AC and Traditional AV by Lumension

May 03, 2013 - (Free Research)
This Tolly Test report compares the effectiveness of both anti-virus and application control solutions to help you decide which would work best for your enterprise. View now to uncover which approach provides greater performance across diverse workloads and protects against more threats to keep your endpoints safe and secure. 
(WHITE PAPER) READ ABSTRACT |

Code Signing Debacle 2.0: A Hacked Adobe Server and Its Impact on Us All by Lumension

May 14, 2013 - (Free Research)
Watch this webinar to learn about the threat of hacked vendor software, the technologies and controls that can help address the risk of compromised code signatures and infrastructures, and how to preemptively address these vulnerabilities. 
(WEBCAST) READ ABSTRACT |

Case Study: Novagalicia Secures Critical Applications with HP Fortify by Hewlett-Packard Limited

April 30, 2013 - (Free Research)
Assessing and improving the security of applications used in financial institutions is paramount. This case study explores the security-as-a-service (SaaS) testing solution one bank used after a merger to quickly and accurately assess their nearly 400 applications. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

Top Five DNS Security Attack Risks and How to Avoid Them by Infoblox

May 31, 2013 - (Free Research)
Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Banca Intesa Counters Threats with HP ArcSight by Hewlett-Packard Limited

March 29, 2013 - (Free Research)
Explore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure. 
(CASE STUDY) READ ABSTRACT |

Case Study: UAEU Sets the Standard for Network Security with HP by Hewlett-Packard Limited

April 30, 2013 - (Free Research)
Explore how the United Arab Emirates University was able to embrace mobile technology in the classroom while successfully mitigating both internal and external threats and increasing security visibility thanks to a next-generation intrusion protection system. 
(CASE STUDY) READ ABSTRACT |

Cisco Annual Security Report by Cisco (E-mail this company)

April 07, 2014 - (Free Research)
Check out this report from Cisco to get insight into expert research and security intelligence. Learn more about global threat trends, improving security posture, and more. 
(WHITE PAPER) READ ABSTRACT |

Three Critical Decisions You Need to Make at the First Sign of a Security Breach by Dell SecureWorks UK

May 23, 2013 - (Free Research)
Uncover three critical questions you should be prepared to answer quickly after the first signs of a security breach to effectively reduce the duration and impact of a breach. 
(WHITE PAPER) READ ABSTRACT |

Overcoming Security Breaches and Minimizing the Impact by Dell SecureWorks UK

May 23, 2013 - (Free Research)
Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach. 
(WHITE PAPER) READ ABSTRACT |

Case Study: The Push For Simple, Cost-effective PCI Compliance by Dell SecureWorks UK

July 16, 2012 - (Free Research)
To avoid fines and meet an upcoming compliance deadline, call centre services provider, RESPONSE (Building Rewarding Relationships), needed to improve security. Read this paper to learn how the organisation secured an easily installed and managed security solution that could also be deployed in time to meet the looming deadline. 
(WHITE PAPER) READ ABSTRACT |

Real-time Monitoring, Alerts, and Analysis Offer In-Depth Security by Dell SecureWorks UK

March 01, 2012 - (Free Research)
In this case study explore how implementing Dell SecureWorks enabled Pharmaceutical firm, ProStrakan, to enhance its security and compliance posture by providing 24/7 monitoring, instant alerts and in-depth threat analysis. 
(CASE STUDY) READ ABSTRACT |

Log Management: How to Develop the Right Strategy for Business and Compliance by Dell SecureWorks UK

August 23, 2010 - (Free Research)
Organisations need a business-based approach to creating a log management strategy that will help them detect attacks, deal with mounds of data collected by network and security devices, and meet compliance requirements. This white paper will outline a five step process which will help reduce the complexity of this process. 
(WHITE PAPER) READ ABSTRACT |

Understanding Advanced Persistent Threats and Complex Malware by Dell SecureWorks UK

October 10, 2012 - (Free Research)
Learn more about the types of malware and advanced persistent threats that your company may be exposed to by viewing this webcast. It also discusses some of the common attributes of Advanced Persistent Threats and what you should be on the look out for. 
(WEBCAST) READ ABSTRACT |

Get to know APTs Before Developing a Security Strategy by Dell SecureWorks UK

July 16, 2012 - (Free Research)
Advanced persistent threats (APT) are a concern for businesses across all industries, as they can pose a threat to an organisation's data, systems, financial assets, and reputation. This analysis explains how to develop an effective and efficient defence strategy that will help you prevent, identify and resolve APTs. 
(WHITE PAPER) READ ABSTRACT |

Outcome Based Security Monitoring in a Continuous Monitoring World by Tenable Network Security (E-mail this company)

December 31, 2012 - (Free Research)
In this white paper, you will discover a five step approach that can help commercial and government organizations achieve their goals of continuous monitoring programs. Learn how this approach leverages distributed scanning, sniffing and log analysis to perform flexible, scalable and near real-time vulnerability detection for any size of network. 
(WHITE PAPER) READ ABSTRACT |

Revolutionary architecture, evolutionary deployment by Cisco (E-mail this company)

February 28, 2013 - (Free Research)
Check out this resource to learn about how rethinking your firewall for context-aware protection can help you achieve breakthrough security while protecting existing security investments. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

ActivEcho Trial Download by Acronis

October 17, 2013 - (Free Research)
activEcho is an enterprise file sharing and syncing solution that balances the end user’s need for simplicity and effectiveness with the security, manageability and flexibility required by Enterprise IT. Download this free trial to give it a try. 
(PRODUCT DEMO) READ ABSTRACT |

Protecting Information from Insider Threats by McAfee.

January 30, 2012 - (Free Research)
Company insiders have what outsiders don’t – trust and legitimate access. Any malicious insider has the ability to steal sensitive data and sabotage assets quickly, easily, and with greater stealth than an external attacker. In this paper, explore best practices and the security controls necessary to combat insider threat. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Mobile Data Protection by McAfee.

September 07, 2010 - (Free Research)
Mobile data protection (MDP) systems are crucial to for ensuring data privacy and compliance. This report explores the overall MDP market, ranking vendors against each other based on competitive criteria. View now to discover were each vendor ranks and which ones meet the needs and budget of your organisation. 
(ANALYST REPORT) READ ABSTRACT |

Evolving Security: 5 Reasons to Outsource Network Security Management in Today's Threat Environment by XO Communications

April 30, 2012 - (Free Research)
Discover five reasons why outsourcing your network security management can help you combat malware, hackers, and the evolving threat landscape. 
(WHITE PAPER) READ ABSTRACT |

Accenture Technology Vision 2014 by ComputerWeekly.com

January 27, 2014 - (Free Research)
The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation. 
(ESSENTIAL GUIDE) READ ABSTRACT |

1 - 25 of 399 | Next Page

> Explore alternative searches for: Security Monitoring

We are always striving to improve our customer experience. Please notify us if there is a company missing that you feel should be in our directory.


Advertisement

Search FindTech

Search the
Technology Services Directory

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts