Accessing EventWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Accessing Event returned the following results.
RSS What is RSS?
Related Categories

 •   Security Monitoring
 •   Data Security
 •   Security Policies
 •   Access Control
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Application Security
 •   Identity Management/ User Provisioning
 •   Business Intelligence Solutions

Related Searches
 •   Accessing Benefits
 •   Accessing Event Capacities
 •   Accessing Event Small
 •   Accessing Matrix
 •   Databases Accessing Event
 •   Improve Accessing Event
 •   Measurement Of Accessing Event
 •   Outsourcing Accessing
 •   Problems Accessing Event
 •   Webinars Accessing Event
Advertisement

ALL RESULTS
1 - 25 of 450 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Magic Quadrant for Security Information and Event Management by Hewlett-Packard Limited

September 19, 2012 - (Free Research)
View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by Hewlett-Packard Company

May 24, 2012 - (Free Research)
View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data. 
(WHITE PAPER) READ ABSTRACT |

Akershus University Hospital: Safeguarding patient privacy with security information and event management by RSA, The Security Division of EMC

May 17, 2009 - (Free Research)
Since 1995, a series of new European regulations have been introduced to protect the security and privacy of personal data held by corporations and public bodies, particularly concerning the logging of access to sensitive information. Read this case study to learn how RSA keeps Akerus University Hospital secure and compliant. 
(CASE STUDY) READ ABSTRACT |

A Guide to Modern IT Disaster Recovery by VMware, Inc.

June 06, 2013 - (Free Research)
This resource presents the theory of Black Swam Events, and shows you how to prepare and mitigate the consequences on your data center. 
(WHITE PAPER) READ ABSTRACT |

Event Stream Processing and Event Driven Architectures by Progress

October 01, 2006 - (Free Research)
This white paper describes the motivation for EDA, introduces ESP, and describes how ESP technology fits within the ESB/SOA model. 
(WHITE PAPER)

Complex event processing for more intelligent business operations by Sybase, an SAP company

June 10, 2011 - (Free Research)
Read this ebizQ e-book for an introduction to complex event processing (CEP). Inside, learn about the role of CEP in intelligent operations, as well as gaining access to a special three-part report on capturing, analyzing and taking action on event data. 
(EBOOK)

Virtual Event: Power to Change - What's changing about ALM? by Hewlett-Packard Company

September 10, 2013 - (Free Research)
Register to attend the free Power to Change online virtual event sponsored by HP to hear industry visionaries, analysts, and practitioners discuss how change is affecting various aspects of application lifecycle management (ALM.) 
(EVENT) READ ABSTRACT |

Cyber Security Intelligence Index - Analysis of Cyber Security attack and incident data by IBM

July 24, 2013 - (Free Research)
IBM Managed Security Services continuously monitors tens of billions of events per day, and this white paper provides you the opportunity to gain insight into what this data really means. Read on to discover the prevalent types of attacks and attackers and the key factors enabling them. 
(WHITE PAPER) READ ABSTRACT |

Moving to Sarbanes-Oxley Compliance in Three Days Using EventTracker by Prism Microsystems Inc.

June 2008 - (Free Research)
The purpose of this document is to explain how EventTracker can help your organization meet the audit reporting requirements of The Sarbanes-Oxley Act of 2002 (SOX). 
(WHITE PAPER) READ ABSTRACT |

University of the Sunshine Coast Improves Security with Sentinel by NetIQ

May 2012 - (Free Research)
Access this case study to uncover how Sentinel helped one educational institution cost-effectively meet audit requirements for monitoring access to core finance systems, provide simpler access to network resources for users while improving security. 
(CASE STUDY) READ ABSTRACT |

Vendor Landscape: Security Information & Event Management by LogRhythm, Inc.

September 2013 - (Free Research)
This white paper helps break down multiple security information and event management (SIEM) vendor details for your convenience and assistance in finding the right one for your business. 
(ANALYST REPORT) READ ABSTRACT |

Six Secrets to 24x7 Exchange Availability by Marathon Technologies

September 2009 - (Free Research)
The following six secrets to 24x7, disaster-tolerant Exchange will show you how to implement an Exchange environment with zero lost data and continuous application availability—with no IT intervention—in the event of a disaster. 
(WHITE PAPER) READ ABSTRACT |

Advanced cyber-security intelligence by ComputerWeekly.com

July 2012 - (Free Research)
Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools. 
(ANALYST REPORT) READ ABSTRACT |

10 Reasons Your Existing Security Information and Event Management Isn't Good Enough by eIQnetworks

February 2009 - (Free Research)
"Are we secure? Is our data protected?" Enterprises have turned to security information and event management (SIEM) solutions to answer these questions and address forensics or security operations issues. For the most part, SIEMs have failed to do what they promised. Read this paper to see what the problems are, and what solutions are available. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by LogRhythm, Inc.

May 2013 - (Free Research)
This Gartner Magic Quadrant on security information and event management (SIEM) systems reveals the strengths and cautions of 16 different vendors to help you find the system that best aligns with your business needs. 
(ANALYST REPORT) READ ABSTRACT |

Managing Medical Image Data by Iron Mountain

March 2012 - (Free Research)
This case study demonstrates how Rockford Health was able to provide their care givers with ready access to patient data while safely archiving medical images and protecting them offsite in the event of a disaster. 
(CASE STUDY) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by LogRhythm, Inc.

July 2012 - (Free Research)
Access this white paper for a comprehensive comparison of the leading security information and event management (SIEM) providers. Read on for an overview of the SIEM market and the vendor landscape to help you evaluate your options. 
(WHITE PAPER) READ ABSTRACT |

Business Agility Insights Vol. 1, No. 4 by IBM

August 2012 - (Free Research)
Read this expert e-guide to learn how CEP and predictive analytics can be incorporated into business process management (BPM) and decision management programs to give today's organizations constant access to the right information so their operations can react quickly to marketplace changes— and, where possible, begin to anticipate them as well. 
(EZINE) READ ABSTRACT |

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple by Lumension

September 2012 - (Free Research)
Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world. 
(VIRTUAL SEMINAR) READ ABSTRACT |

GFI EventsManager by GFI Software

June 2007 - (Free Research)
GFI EventsManager collects data from all devices that use Windows event logs, W3C, and Syslog and applies the best rules and filtering in the industry to identify key data. 
(TRIAL SOFTWARE) READ ABSTRACT |

Going Beyond Traditional Security Information and Event Management (SIEM) Solutions by eIQnetworks

March 2009 - (Free Research)
Why is Security Information and Event Management (SIEM) so important to security efforts? What steps must you take must to succeed with your SIEM implementation? This podcast addresses these questions and more. 
(PODCAST) READ ABSTRACT |

How To Use SIEM Technology To Identify Unauthorized Access Attempts by Hewlett-Packard Company

December 2013 - (Free Research)
Many organizations are utilizing SIEM technology to help prevent data theft. This expert e-guide explains how SIEM technology can identify unauthorized access attempts to your network. 
(EGUIDE) READ ABSTRACT |

ExtraView Enterprise by Extraview Corporation

ExtraView Enterprise enables organizations to quickly and cost-effectively, create user specific web-based solutions that conform to a corporation's unique business processes and workflow requirements. 
(ASP & SOFTWARE PRODUCT)

IT Briefing: SIEM 3.0: The Next Generation of Security and Compliance Monitoring by ArcSight, an HP Company

October 2008 - (Free Research)
Read this IT briefing to learn more about interesting trends in the security information and event monitoring (SIEM) industry. 
(WHITE PAPER) READ ABSTRACT |

On Lockdown: HMV/Waterstone’s asserts control over user activity by Safestone Technologies

September 2011 - (Free Research)
Download this case study to discover how, by deploying Safestone’s DetectIT solution, the organization can now granularly control access to areas their systems and meet their compliance requirements. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 450 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts