Example Events SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Example Events Security returned the following results.
RSS What is RSS?
Related Categories

 •   Security Monitoring
 •   Data Security
 •   Security Policies
 •   Enterprise Systems Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Application Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Change and Configuration Management

Related Searches
 •   Benefit Example Events Security
 •   Example Consultants
 •   Example Design
 •   Example Events Arkansas
 •   Example Events Demand
 •   Example Events Security Measured
 •   Guides Example Events
 •   Outsource Example Events
 •   Protocol Example Events Security
 •   White Paper Example
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

GFI LANguard Security Event Log Monitor - Downloads by GFI Software

May 01, 2006 - (Free Research)
GFI LANguard S.E.L.M. ships with a security event analysis engine which takes into account the type of security event, security level of each computer, when event occurred, role of computer and its operation system. 
(TRIAL SOFTWARE) READ ABSTRACT |

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

Advanced cyber-security intelligence by ComputerWeekly.com

July 05, 2012 - (Free Research)
Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools. 
(ANALYST REPORT) READ ABSTRACT |

Three Critical Decisions You Need to Make at the First Sign of a Security Breach by Dell SecureWorks UK

May 23, 2013 - (Free Research)
Uncover three critical questions you should be prepared to answer quickly after the first signs of a security breach to effectively reduce the duration and impact of a breach. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing for Developers by IBM

September 13, 2010 - (Free Research)
Join us for the Cloud computing for developers virtual events in October and learn how to solve business and technical challenges in the cloud. Through real-world examples of specific challenges and solutions, as well as live demos of techniques and products, you can learn more about leveraging the cloud. Read on for details. 
(EVENT)

Combat Cybercrime, Demonstrate Compliance and Streamline IT Operations by ArcSight, an HP Company

March 02, 2010 - (Free Research)
This whitepaper discusses the requirements for a universal log management solution and specifically describes how ArcSight Logger 4 delivers on those requirements. A recent cyberespionage incident at Boeing Corporation is highlighted as an example. Read more to find out. 
(WHITE PAPER) READ ABSTRACT |

Blackberry Enterprise Solution: Security Technical Overview by BlackBerry

December 2008 - (Free Research)
This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture. 
(WHITE PAPER) READ ABSTRACT |

What You Need to Know Now About CEP and BAM by SearchSOA.com

July 2013 - (Free Research)
Complex event processing (CEP) and business activity monitoring (BAM) are popular tools for managing information that moves faster -- and in higher volumes -- than ever before. 
(EGUIDE) READ ABSTRACT |

Expert Steps for Testing DR Effectiveness by SearchStorage.com

June 2013 - (Free Research)
This E-Guide outlines three key phases of DR performance evaluation and provides two examples of how conducting a business impact analysis can minimize the effects of a disruption. 
(EGUIDE) READ ABSTRACT |

SIEM and DLP Together: A More Intelligent Information Risk Management Strategy by RSA, The Security Division of EMC

December 2009 - (Free Research)
This paper explores examples of how DLP and SIEM together can make for more intelligent information risk management. 
(WHITE PAPER) READ ABSTRACT |

Managing IT projects for business change. Dealing with trouble. by ComputerWeekly.com

April 2014 - (Free Research)
Jeff Morgan and Chris Dale offer advice on managing unanticipated events that can disrupt IT projects in this extract from their book, Managing IT Projects for Business Change. 
(PRESENTATION) READ ABSTRACT |

Realizing the Economic Benefits of Oracle Enterprise Manager Ops Center by Oracle Corporation

March 2011 - (Free Research)
This paper examines areas of potential optimization, shows how day-to-day IT management processes can contribute to – rather than detracts from – that optimization, and provides an ROI analysis with an example scenario based on actual deployments. 
(WHITE PAPER) READ ABSTRACT |

ExtraView Enterprise by Extraview Corporation

ExtraView Enterprise enables organizations to quickly and cost-effectively, create user specific web-based solutions that conform to a corporation's unique business processes and workflow requirements. 
(ASP & SOFTWARE PRODUCT)

Prepare for the unexpected: Guide to modern IT disaster recovery by VMware, Inc.

June 2013 - (Free Research)
This resource presents the theory of Black Swam Events, and shows you how to prepare and mitigate the consequences on your data center. 
(WHITE PAPER) READ ABSTRACT |

Implement Money and Time Savings Strategies by CCSS

April 2010 - (Free Research)
The powerful functionality and continued development of the QSystems Management Suite is driven by our commitment to meet the ever-changing, real-world needs of our customers. Learn more about money and time saving strategies available for your business by reading these examples. 
(WHITE PAPER) READ ABSTRACT |

Transformation Through Innovation by ComputerWeekly.com

December 2013 - (Free Research)
David Cooper, CIO of British Gas discusses how to transform an IT organisation into an innovative force within a business while reducing the cost of change in this PowerPoint presentation. 
(PRESENTATION) READ ABSTRACT |

TimeSummit by Exaktime

Time and attendance records collected in your JobClocks and/or PocketClocks are easily transferred into TimeSummit software, automatically assembled and presented to you in clear, concise reports. 
(SOFTWARE PRODUCT)

Vestcom International: Personalization Drives Repeat Business by Exstream Software

April 2008 - (Free Research)
Vestcom International is a New Jersey-based firm that offers end-to-end personalized communication solutions. Vestcom used Exstream Software's Dialogue solution to design a sophisticated relationship management program that is fostering... 
(CASE STUDY) READ ABSTRACT |

Fast Delivery of Complex Financial Reports - How Leading CFOs Do It by IBM

November 2011 - (Free Research)
Reporting speed and accuracy are vital today. But it would be wrong to assume that you have to spend more to go faster and do a competent job. This white paper illustrates how some organizations achieved top-tier results in financial reporting and why some did not. 
(WHITE PAPER) READ ABSTRACT |

Hands-on Oracle Application Express security by ComputerWeekly.com

November 2013 - (Free Research)
This book extract demonstrates how Oracle Application Express (APEX) can be vulnerable to SQL injection, using sample code. 
(BOOK) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by Hewlett-Packard Limited

September 2012 - (Free Research)
View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data. 
(WHITE PAPER) READ ABSTRACT |

Return on Investment (ROI) and Security Information and Event Management (SIEM): How RSA enVision Delivers an Industry Best ROI by RSA, The Security Division of EMC

June 2009 - (Free Research)
This White Paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization. 
(WHITE PAPER) READ ABSTRACT |

Moving to Sarbanes-Oxley Compliance in Three Days Using EventTracker by Prism Microsystems Inc.

June 2008 - (Free Research)
The purpose of this document is to explain how EventTracker can help your organization meet the audit reporting requirements of The Sarbanes-Oxley Act of 2002 (SOX). 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by LogRhythm, Inc.

July 2012 - (Free Research)
Access this white paper for a comprehensive comparison of the leading security information and event management (SIEM) providers. Read on for an overview of the SIEM market and the vendor landscape to help you evaluate your options. 
(WHITE PAPER) READ ABSTRACT |

The Event Data Warehouse- Strategies for Improving Business Performance by Hexis Cyber Solutions Inc

July 2011 - (Free Research)
Organizations are at risk if they do not plan to implement an enterprise-wide security and event data warehouse to make strategic decisions. This paper introduces Event Data Warehouse, a unique, cost effective and proven solution, that provides actionable results that enable better business decisions. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts