Events Whitepaper SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Events Whitepaper Security returned the following results.
RSS What is RSS?
Related Categories

 •   Security Monitoring
 •   Data Security
 •   Network Security
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Application Security
 •   Event Automation
 •   Intrusion Detection/ Forensics
 •   Automated Security Auditing/ Source Code Analysis
 •   Vulnerability Assessment

Related Searches
 •   Devices Events Whitepaper
 •   Events Whitepaper Examples
 •   Events Whitepaper Security Designers
 •   Events Whitepaper Security Migration
 •   Events Whitepaper Security Problem
 •   Events Whitepaper Types
 •   Hr Events Whitepaper Security
 •   Specialist Events
 •   Us Events Whitepaper
Advertisement

ALL RESULTS
1 - 25 of 441 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Secure, Simple and Powerful Log Management with Novell® Sentinel™ Log Manager by Novell, Inc.

December 08, 2009 - (Free Research)
Read this whitepaper to find out how Novell's Sentinel™ Log Management solution simplifies compliance by collecting, storing, analyzing and managing data logs from all across your enterprise. 
(WHITE PAPER) READ ABSTRACT |

Technical Whitepaper - Using FalconStor CDP with Microsoft Exchange 2007 by FalconStor Software

October 28, 2009 - (Free Research)
This paper illustrates how to use FalconStor CDP to protect a Microsoft® Exchange 2007 server and its email database(s). It also explains how continuous real-time data journaling and periodic snapshots provide simple, rapid, and granular recovery to any point in time. 
(WHITE PAPER) READ ABSTRACT |

Top 5 truths about Big Data - Hype and Security Intelligence by Hewlett-Packard Limited

April 08, 2014 - (Free Research)
In this whitepaper, Randy Franklin Smith of UltimateWindowsSecurity.com discusses the key tenets of the realationship between Big Data and security information and event management. 
(WHITE PAPER) READ ABSTRACT |

Security Intelligence: Can "Big Data" Analytics Overcome our Blind Spots? by LogRhythm, Inc.

December 31, 2012 - (Free Research)
Explore the current SIEM tools and capabilities today and uncover how new improvements in SIEM can help boost your defenses in today's threat-filled world. 
(WHITE PAPER) READ ABSTRACT |

Virtual + Physical = Hybrid Events:  Best Practices for Creating Compelling, Innovative Hybrid Events by INXPO

November 16, 2010 - (Free Research)
This whitepaper explores the growing role of virtual technologies in physical events (hybrid events) in marketing and communication, as well as identifies five best practices for maximizing their success in achieving organizational goals. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Information Security Services: Preparing for Distributed Denial of Service (DDoS) Attacks by Dell SecureWorks UK

February 28, 2011 - (Free Research)
This essential whitepaper explores the current state of DDoS attacks and outlines why you need a proactive prevention strategy. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Combat Cybercrime, Demonstrate Compliance and Streamline IT Operations by ArcSight, an HP Company

March 02, 2010 - (Free Research)
This whitepaper discusses the requirements for a universal log management solution and specifically describes how ArcSight Logger 4 delivers on those requirements. A recent cyberespionage incident at Boeing Corporation is highlighted as an example. Read more to find out. 
(WHITE PAPER) READ ABSTRACT |

Audits, Compliance and Security: ITPros share their experience by Dell, Inc.

March 07, 2014 - (Free Research)
This whitepaper talks about a solution that allows users to better track and audit malicious or unintentional changes to their Windows environment. It gives interviews with users from various industries to see how the solution worked for them. 
(WHITE PAPER) READ ABSTRACT |

Linear Architecture for Municipal Wireless Video Surveillance Solutions by Motorola, Inc.

August 20, 2009 - (Free Research)
Motorola knows how to build systems that meet the needs of Public Safety professionals now and over the lifetime of the network. No one technology meets the needs of all applications. With a portfolio of specialized solutions, CIOs and network operators can deploy the network that is the best fit to locate the cameras exactly where they are needed. 
(WHITE PAPER) READ ABSTRACT |

Leveraging security from the Cloud by IBM

July 01, 2011 - (Free Research)
Cloud computing is a flexible, cost-effective and proven delivery platform for providing business or consumer IT services over the Internet. This whitepaper discusses the who, what, when, why and how of cloud-based security services. 
(WHITE PAPER) READ ABSTRACT |

The Ten "Must Haves" for Secure Mobile Device Management by Zenprise

December 30, 2011 - (Free Research)
Discover why an end-to-end mobile security framework is vital to protecting your network, corporate information, and the devices accessing them. 
(WHITE PAPER) READ ABSTRACT |

Choosing a partner for enterprise cloud production workloads by IBM

May 01, 2013 - (Free Research)
Despite initial hesitancy, companies of all sizes are considering moving their enterprise-class applications to the cloud. This whitepaper provides a checklist for choosing the right managed third-party provider for your business. 
(WHITE PAPER) READ ABSTRACT |

Eight Showstopper Problems with BPEL Servers for Event-Driven SOA by Fiorano Software, Inc.

August 2008 - (Free Research)
This paper analyzes some critical implementation-level problems faced by current BPEL products in real-world implementations. 
(WHITE PAPER) READ ABSTRACT |

Behavior-Driven Development and BRMS by Red Hat

September 2013 - (Free Research)
This whitepaper explains how enterprise organizations can keep pace with the demands of our rapid global marketplace with a combination of software and professional services from Red Hat. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact™ of Oracle Enterprise Manager Configuration Management Pack, and Provisioning and Patch Automation Pack by Oracle Corporation

March 2009 - (Free Research)
Learn how Oracle's comprehensive industry leading configuration management and provisioning automation solutions help you reduce application management costs while delivering greater control and compliance. 
(WHITE PAPER) READ ABSTRACT |

Workflow, Rules, and CEP Combine to Drive New Business Value by Red Hat

October 2012 - (Free Research)
Read this whitepaper to see why today's BPM projects involve a shift from manual to automated tasks, back-end orchestration, extensive use of rules, event-driven problem detection, and more dynamic capabilities that support knowledge workers. 
(WHITE PAPER) READ ABSTRACT |

Deliver Dynamic Business Continuity for the Enterprise with Dell Compellent Live Volume by Dell, Inc.

November 2011 - (Free Research)
This whitepaper provides solutions to help avoid downtime from planned outages, balance workloads on demand, and easily shift resources across the cloud. 
(WHITE PAPER) READ ABSTRACT |

Mastering Disaster Recovery in the Cloud by VMware, Inc.

February 2014 - (Free Research)
This whitepaper looks at how organizations are turning to Disaster-Recovery-as-a-Service in the wake of Hurricane Sandy. Also learn how to pick the right provider for your organization. 
(WHITE PAPER) READ ABSTRACT |

7 Faulty Beliefs About Disaster Recovery by IBM

August 2013 - (Free Research)
This whitepaper discusses the common problems with in-house disaster recovery and offers up seven faulty beliefs most organizations have about DR. 
(WHITE PAPER) READ ABSTRACT |

Beyond Cost Savings: Four Compelling Reasons To Virtualize Your IT Environment by VMware, Inc.

March 2014 - (Free Research)
This exclusive whitepaper covers four less well known reasons beyond cost savings that should compel you to virtualize your data center. 
(WHITE PAPER) READ ABSTRACT |

Fundamental Principles of Generators for Information Technology by APC by Schneider Electric

November 2011 - (Free Research)
This whitepaper covers the basics on standby generators and systems to prepare your IT staff for any prolonged utility power outages. 
(WHITE PAPER) READ ABSTRACT |

GFI LANguard Security Event Log Monitor - Downloads by GFI Software

May 2006 - (Free Research)
GFI LANguard S.E.L.M. ships with a security event analysis engine which takes into account the type of security event, security level of each computer, when event occurred, role of computer and its operation system. 
(TRIAL SOFTWARE) READ ABSTRACT |

Moving to Sarbanes-Oxley Compliance in Three Days Using EventTracker by Prism Microsystems Inc.

June 2008 - (Free Research)
The purpose of this document is to explain how EventTracker can help your organization meet the audit reporting requirements of The Sarbanes-Oxley Act of 2002 (SOX). 
(WHITE PAPER) READ ABSTRACT |

Return on Investment (ROI) and Security Information and Event Management (SIEM): How RSA enVision Delivers an Industry Best ROI by RSA, The Security Division of EMC

June 2009 - (Free Research)
This White Paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 441 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts