Event LatestWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Event Latest returned the following results.
RSS What is RSS?
Related Categories

 •   Security Monitoring
 •   Data Security
 •   Network Security
 •   Event Automation
 •   Data Center Management
 •   Security Policies
 •   Managed Security Services
 •   Application Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Business Intelligence Solutions

Related Searches
 •   Corporation Event
 •   Creating Event Latest
 •   Event Latest Distributions
 •   Event Latest Environment
 •   Event Latest Export
 •   Event Latest Introduction
 •   Event Latest Retail
 •   Frameworks Event Latest
 •   Implementation Event Latest
 •   It Event Latest
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Podcast: Automating Resource Monitoring with Robot/CONSOLE by Help/Systems

April 28, 2010 - (Free Research)
Listen as we discuss the importance of monitoring and event notification for today’s computer systems. Learn about the critical role that Robot/CONSOLE can play by automating these processes. 
(PODCAST) READ ABSTRACT |

Drive Your Enterprise with Event-Driven Scheduling by Help/Systems

September 17, 2009 - (Free Research)
Use Event Monitors to create an event-driven schedule for your enterprise using system events on your Windows, UNIX, and Linux servers to launch reactive jobs through Robot/SCHEDULE. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 6 September 2011: Download the latest issue of the UK’s leading technology publication, featuring the news, analysis and opinion that matters to IT decision-makers by ComputerWeekly.com

September 06, 2011 - (Free Research)
In this week's Computer Weekly, we take an in-depth look at HP's strategic shake-up, and ask what it means for the supplier's customers and the UK IT industry as a whole. We also discuss a major research study into why IT projects go wrong, and start our latest Buyer's Guide, about business intelligence. Download the new issue now. 
(EZINE)

Magic Quadrant for Security Information and Event Management by Hewlett-Packard Limited

September 19, 2012 - (Free Research)
View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data. 
(WHITE PAPER) READ ABSTRACT |

HP Enterprise Services on leveraging latest innovations of SAP Solution Manager by Hewlett-Packard Limited

March 05, 2014 - (Free Research)
The following webcast joins Chris Nokkentved on leveraging the latest innovations of SAP Solution manager. Explore how converting events to alerts and alerts to incidents will allow for greater efficiencies in IT and how business operations management can give a whole new level of business awareness to operations. Start viewing now to learn more. 
(VIDEO) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by Hewlett-Packard Company

May 24, 2012 - (Free Research)
View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data. 
(WHITE PAPER) READ ABSTRACT |

NetIQ Sentinel 7 Review - Real-time SEIM and Log Manangement for Today by NetIQ

March 13, 2012 - (Free Research)
This paper offers a functional review of the latest NetIQ offering in security information and event management (SIEM) that effectively address log management issues. View now to explore how NetIQ performs in event correlation alerting, security intelligence and trend analysis and more. 
(WHITE PAPER) READ ABSTRACT |

The Complete Guide to Log and Event Management by Novell, Inc.

March 07, 2011 - (Free Research)
This paper analyzes the relationship between SIEM and log management - focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments. 
(WHITE PAPER) READ ABSTRACT |

Infosecurity Europe 2014 by ComputerWeekly.com

February 24, 2014 - (Free Research)
Infosecurity Europe is the largest IT security event in Europe. Held in London, it is a free exhibition with over 325 exhibitors featuring the most diverse range of new products and services and an unrivalled free education programme. Register today! 
(BROCHURE) READ ABSTRACT |

SIEM IT Decision Center- Checklist #1 by SearchSecurity.com

January 01, 2013 - (Free Research)
If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms. 
(EGUIDE) READ ABSTRACT |

NetDetector/NetVCR 2005 Traffic Analyzer by NIKSUN

January 2008 - (Free Research)
The NetDectector/NetVCR 2005 maintains the entire packet and all related network traffic so that the alert or incident can be reviewed in context. 
(ANALYST REPORT) READ ABSTRACT |

Boosting Enterprise Security with Integrated Log Management by IBM

May 2013 - (Free Research)
Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments. 
(WHITE PAPER) READ ABSTRACT |

Boosting Enterprise Security with Integrated Log Management by IBM

May 2013 - (Free Research)
Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments. 
(WHITE PAPER) READ ABSTRACT |

Symantec Internet Security Threat Report by Symantec Corporation

April 2013 - (Free Research)
This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

Keep Your Enemies Closer - Get Proactive about Security by AT&T Corp

March 2011 - (Free Research)
Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance. 
(WEBCAST)

Mobile ticketing opens doors of opportunity for business by ComputerWeekly.com

November 2010 - (Free Research)
Juniper Research defines a mobile ticketing user as “someone who stores a ticket on their mobile phone for later redemption” at the point of travel, the music venue, the cinema etc. 
(WHITE PAPER) READ ABSTRACT |

Plantronics, Simply Smarter Communications by Plantronics

May 2011 - (Free Research)
Mark your calendar for May 18 at 10 a.m. EDT/7 a.m. PDT for this global web event.  Sign up for a reminder so you don’t miss a word. 
(WEBCAST) READ ABSTRACT |

The Data Recovery Workbook by Iron Mountain

December 2013 - (Free Research)
This informative paper explores the basics of developing a plan that will help you protect your data should the worst (or not-quite-worst) happen. Read on now to discover five key steps for protecting your business data and get started! 
(WHITE PAPER) READ ABSTRACT |

QRadar Risk Manager: Security Intelligence Keeps You Ahead of Threats by IBM

January 2013 - (Free Research)
This white paper highlights an automated risk management solution that correlates information on asset vulnerabilities and device configurations to better predict risks before they occur. 
(WHITE PAPER) READ ABSTRACT |

Simplifying the Scope of the PCI Audit: How Cross-Platform Server Isolation Helps Retailers Achieve Compliance by Apani

February 2008 - (Free Research)
This paper will describe how Apani EpiForce can solve key aspects of the PCI compliance challenge. Apani® EpiForce® proactively eliminates vulnerabilities within the corporate network by isolating computers and the business-critical data, personal information and intellectual property stored on them into logical security zones. 
(ARTICLE) READ ABSTRACT |

Disclosure Management for budgeting, planning and forecasting -- the next frontier? by IBM

October 2012 - (Free Research)
This resource explains how disclosure management can lead to significant productivity gains when used for statutory reporting, and evaluates the viability of this strategy as an option for improving budgeting, planning, and forecasting (BPF) financial processes. 
(WHITE PAPER) READ ABSTRACT |

New Storage Buying Criteria for Shared Virtual Infrastructure by NetApp

September 2010 - (Free Research)
You can’t make the best storage decisions for your business if you’re not asking the right questions. Our “New Storage Buying Criteria for Shared Virtual Infrastructure RFP template” makes it easy. Use it to help ensure the solutions you choose can deliver extreme flexibility and efficiency, and a “future-proof” foundation. 
(WHITE PAPER) READ ABSTRACT |

How White Papers Can Turbo-Boost Your Lead Gen Campaigns by KnowledgeStorm Webinars (E-mail this company)

September 2006 - (Free Research)
In this upcoming Webcast, "How White Papers Can Turbo-Boost Your Lead Gen Campaigns", white paper guru Michael Stelzner, author of "Writing White Papers: How to Capture Readers and Keep Them Engaged," will share his secrets on creating white papers that attract prospects in droves. This Webcast is presented by KnowledgeStorm. 
(WEBCAST) READ ABSTRACT |

Computer Weekly – 12 February 2013: Can BlackBerry 10 bridge the business-consumer smartphone divide? by ComputerWeekly.com

February 2013 - (Free Research)
In this week's Computer Weekly, we look at the new smartphone from BlackBerry – it's designed to please both business and consumer users, but is it enough to save the company? We examine the options for using cloud services for disaster recovery. And IT leaders tell us what they think about the future of the data centre. Read the issue now. 
(EZINE) READ ABSTRACT |

Acumin Contract Rate Index August 2012 by ComputerWeekly.com

September 2012 - (Free Research)
Check out the daily contract rates for IT security professionals in this research from Acumin and Computer Weekly. 
(ESSENTIAL GUIDE) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts