Outline EventWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Outline Event returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Security Policies
 •   Event Automation
 •   Network Security
 •   Disaster Recovery
 •   Events Planning, Trade Shows and Meeting Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Virtualization
 •   Application Security

Related Searches
 •   Costs Outline Event
 •   Find Outline Event
 •   Outline Demonstrations
 •   Outline Event Vendors
 •   Outline Illinois
 •   Outline Patent
 •   Outline Planner
 •   Outline Print
 •   Outline Rfi
 •   Statements Outline
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

The Complete Guide to Log and Event Management by Novell, Inc.

May 11, 2011 - (Free Research)
This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together. 
(WHITE PAPER) READ ABSTRACT |

Vendor Landscape: Security Information & Event Management by LogRhythm, Inc.

July 24, 2012 - (Free Research)
This informative resource demonstrates how organizations can find a SIEM solution and achieve key goals. Other topics explained in this white paper include; understanding the capabilities of SIEM technologies and potential use cases. 
(WHITE PAPER) READ ABSTRACT |

Business Continuity Management by Matrix42

September 2008 - (Free Research)
This White paper explains the concept of Business Continuity and demonstrates how matrix42 Empirum supports the Business Continuity Strategy in the enterprise. 
(WHITE PAPER) READ ABSTRACT |

Building a Successful Security Operations Center by ArcSight, an HP Company

December 2009 - (Free Research)
Designing, building, and managing an internal security operations center can dramatically improve an organization's ability to rapidly recognize and respond to malicious information security events. This paper outlines industry best practices for building and maturing a security operations center (SOC). 
(WHITE PAPER) READ ABSTRACT |

SIEM Optimization: Ensuring Compliance and Security by LogRhythm, Inc.

September 2013 - (Free Research)
Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization. 
(WEBCAST) READ ABSTRACT |

The future of BPM by OpenText

May 2013 - (Free Research)
Read today's expert resource to learn the new trends of business process management (BPM) including event processing, predictive analytics, and business process competency centers. And hear from experts on how to bring these new technologies to your organization's BPM strategy. 
(EGUIDE) READ ABSTRACT |

Information Security Essential Guide: The Evolution of Threat Detection and Management by SearchSecurity.com

May 2013 - (Free Research)
This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by Hewlett-Packard Limited

September 2012 - (Free Research)
View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data. 
(WHITE PAPER) READ ABSTRACT |

Network Forensics in a 10G World by WildPackets, Inc.

August 2013 - (Free Research)
This resource outlines the challenges inherent to 10G network forensics, explains why traditional network analysis is ineffective, and offers guidance on how to build and deploy effective forensics in a 10G world. 
(WHITE PAPER) READ ABSTRACT |

Implementing Highly Available Data Protection with Veritas NetBackup by Symantec Corporation

February 2008 - (Free Research)
This paper looks at the components of a data protection system based on NetBackup and outlines a number of different configurations and solutions aimed at both reducing the risk of failure within a particular site and recovering from the loss of the site. 
(WHITE PAPER) READ ABSTRACT |

Information Security Services: Preparing for Distributed Denial of Service (DDoS) Attacks by Dell SecureWorks UK

February 2011 - (Free Research)
This essential whitepaper explores the current state of DDoS attacks and outlines why you need a proactive prevention strategy. 
(WHITE PAPER) READ ABSTRACT |

Adapt your technology, services, and organization to cloud: HP Converged Cloud Workshop by HP & Intel®

May 2012 - (Free Research)
This paper introduces the HP Converged Cloud Workshop, which helps you gain clarity on your cloud strategy, identify the cloud initiatives that can work for your business, and create a roadmap that defines your steps forward. Read on to better understand the cloud computing model and how it fits in with traditional IT solution sourcing. 
(WHITE PAPER) READ ABSTRACT |

Plan Now, Worry Less After by Iron Mountain

March 2012 - (Free Research)
Check out this white paper for a guide to compiling a successful post-disaster checklist. Receive 4 post-disaster musts, learn 3 keys to staying afloat following a disaster, discover the importance of internal communication during downtime and more. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: The Business Case for Database Activity Monitoring-- Who's Watching the Watchers? by Guardium, an IBM Company

March 2010 - (Free Research)
This Presentation Transcript is an introduction to database activity monitoring and covers the basics of how this important technology works. It also offers tips on how to demonstrate to business leaders that database activity monitoring can not only help data protection efforts, but can also augment an organisational compliance program. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Continuity of Operations Planning: Implement COOP Requirements For Storage with HP LeftHand P4000 SAN Solutions by Hewlett-Packard Company

August 2009 - (Free Research)
Continuity of Operations Planning (COOP) is the disciplined planning needed to prepare for a natural or man-made emergency that affects service availability. This data sheet presents an effective solution for COOP from HP. 
(WHITE PAPER) READ ABSTRACT |

Creating and Testing Your IT Recovery Plan by QuorumLabs

October 2011 - (Free Research)
Regular tests of your IT disaster recovery plan can mean the difference between a temporary inconvenience or going out of business. Read this white paper to learn how to create and implement a successful DR plan to ensure your business is prepared. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Security and your Technology by Hewlett-Packard Company

June 2014 - (Free Research)
This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise. 
(WEBCAST) READ ABSTRACT |

Find the Needle in the Haystack – Audit and Compliance Reporting for AIX by Safestone Technologies

November 2011 - (Free Research)
This white paper discusses how organizations can address the challenge of meeting audit and compliance regulations, whilst driving down costs and reducing risk. It outlines how Safestone’s Compliance Center for AIX solution efficiently collects raw data and refines it into easy-to-understand, actionable information. 
(WHITE PAPER) READ ABSTRACT |

SIEM Best Practices for Advanced Attack Detection by SearchSecurity.com

May 2013 - (Free Research)
The industry has panned SIEM as an expensive and under performing technology. But to be clear, it's not a technology problem, it's a process issue. In this tech tip, Securosis analyst Mike Rothman will outline a time tested process to build SIEM policies which actually alert on the attacks you need to protect against. 
(EGUIDE) READ ABSTRACT |

10 Ways to Build a Better Big Data Security Strategy by Hewlett-Packard Limited

January 2014 - (Free Research)
This informative whitepaper explores the role of Big Data and outlines 10 best practices for Big Data security. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Strategies for Improving Supply Chain Visibility with Technology by Apriso Corporation

September 2010 - (Free Research)
In the Presentation Transcript of the webcast, “Strategies for improving supply chain visibility with technology,” Julie Fraser outlines strategies for improving a supply chain visibility strategy with the help of technology. Follow the link to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

IBM: An Early Leader across the Big Data Security Analytics by IBM

June 2013 - (Free Research)
Security data collection and analysis has become a big data dilemma – so why wouldn't you adopt a big data approach? This resource outlines why legacy analytics and SIEM tools are inefficient and explores how adopting a solution that combines real-time and asymmetric big data security analytics is vital to success. 
(WHITE PAPER) READ ABSTRACT |

2009 ERP Report: Hospitality and Entertainment by Panorama Consulting Group

November 2009 - (Free Research)
This part of Panorama’s ERP Report outlines the use of ERP software at companies in the hospitality and entertainment industry, including a comparison of ERP results to other industries. This study includes ERP implementation results surrounding average budget, duration, actual costs, and implementation variables. 
(ANALYST REPORT) READ ABSTRACT |

Essential ITIL: What You Need to Succeed by CA Technologies.

August 2008 - (Free Research)
ITIL starts with a commitment to the people of IT, because it consists of a series of individual IT practitioner certifications. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts