Hexis Cyber Solutions IncWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for company name: Hexis Cyber Solutions Inc returned the following results.
RSS What is RSS?
Related Categories

 •   Security Monitoring
 •   Data Security
 •   Security Policies
 •   Data Warehousing
 •   Enterprise Information Integration/ Metadata Management
 •   Business Intelligence Solutions
 •   Databases
 •   Statistical Data Analysis
 •   Network Security
 •   Operational BI

Advertisement

ALL RESULTS
1 - 20 of 20

Achieving PCI Compliance with Log Management by Hexis Cyber Solutions Inc

July 2008 - (Free Research)
This white paper will review what is specifically called for in PCI DSS Requirement 10, explore the technical considerations of the requirement, and consider some different approaches to addressing the requirement. 
(WHITE PAPER) READ ABSTRACT |

HawkEye G-The Active Defense Grid by Hexis Cyber Solutions Inc

May 2014 - (Free Research)
This informative whitepaper takes a look at a unique security tool designed to prevent advanced persistent threats. 
(WHITE PAPER) READ ABSTRACT |

Five Things To Do After You've Been Hacked by Hexis Cyber Solutions Inc

May 2014 - (Free Research)
Access this informative guide to find out 5 things to do after you've been hacked – keeping your system safe and secure. 
(WHITE PAPER) READ ABSTRACT |

Five Things To Do After An Attack by Hexis Cyber Solutions Inc

May 2014 - (Free Research)
Advanced persistent threats are a top priority for many IT departments – as they should be. Access this informative whitepaper and find out 5 things to do after a potential attack. 
(WHITE PAPER) READ ABSTRACT |

Overcoming Today's Compliance and Security Data-Related Challenges by Hexis Cyber Solutions Inc

May 2014 - (Free Research)
This informative whitepaper explores a unique strategy for overcoming today's compliance and security data-related challenges. 
(WHITE PAPER) READ ABSTRACT |

Data Breach Detection and Response by Hexis Cyber Solutions Inc

May 2014 - (Free Research)
This informative resource explores the changes in data breaches and outlines a strategy for incident response. 
(WEBCAST) READ ABSTRACT |

A Community Approach to your Enterprise Security by Hexis Cyber Solutions Inc

May 2014 - (Free Research)
This informative resource explores one company's solution and its unique community based approach to your enterprise security. 
(WEBCAST) READ ABSTRACT |

Advanced Persistent Threats: Detect, Engage and Remove by Hexis Cyber Solutions Inc

May 2014 - (Free Research)
This informative resource explores a unique, next-generation strategy for thwarting APTs – focusing their attention on the behavior examination. 
(WEBCAST) READ ABSTRACT |

Technical Considerations for Selecting the Best Antimalware Technology by Hexis Cyber Solutions Inc

June 2014 - (Free Research)
This informative e-guide discusses the evolution of malware and how today's antimalware products should handle detection and remediation. 
(EGUIDE) READ ABSTRACT |

SenSage Event Data Warehouse by Hexis Cyber Solutions Inc

July 1967 - (Free Research)
This document explains how SenSage advantage meets key compliance requirements in PCI, HIPAA, SOX, NISPOM, FISMA, DCID and more. 
(WHITE PAPER) READ ABSTRACT |

Event Data Warehousing by Hexis Cyber Solutions Inc

February 2008 - (Free Research)
This white paper describes that data warehousing should not necessarily be the basis upon which companies retain and query historic data for prolonged periods. 
(WHITE PAPER) READ ABSTRACT |

Database Auditing Tools and Strategies by Hexis Cyber Solutions Inc

November 2008 - (Free Research)
This paper is to introduce the current options available for database auditing and trade-offs using each. 
(WHITE PAPER) READ ABSTRACT |

A Community Approach to your Enterprise Security by Hexis Cyber Solutions Inc

May 2014 - (Free Research)
This informative resource explores one company's solution and its unique community based approach to your enterprise security. 
(WEBCAST) READ ABSTRACT |

Advanced Persistent Threats: Detect, Engage and Remove by Hexis Cyber Solutions Inc

October 2013 - (Free Research)
This informative resource explores a unique, next-generation strategy for thwarting APTs – focusing their attention on the behavior examination. 
(WEBCAST) READ ABSTRACT |

Defending Against APTs: Do You Have the Complete Picture? by Hexis Cyber Solutions Inc

July 2013 - (Free Research)
Uncover the ins and outs of APTs and learn why current defenses lack the ability to protect your organization. In addition, learn about a pioneering security management approach that provides the features you need to combat these troublesome threats. 
(WHITE PAPER) READ ABSTRACT |

Security Policies for Next-Generation IT by Hexis Cyber Solutions Inc

October 2012 - (Free Research)
This CIO Decisions e-zine focuses on effective BYOD security policy. Inside, learn why security threats are evolving faster than the management practices that defend against them and, more importantly, how you can stay ahead. 
(EBOOK) READ ABSTRACT |

Sharing Security Intelligence: How to Build a Strong Network by Hexis Cyber Solutions Inc

June 2013 - (Free Research)
This expert e-guide from SearchSecurity.com explores how joining and creating strong security networks within which you share security intelligence data are crucial to avoiding security incidents and remaining secure. 
(EGUIDE) READ ABSTRACT |

Big Data Security Analytics: Harnessing New Tools for Better Security by Hexis Cyber Solutions Inc

June 2013 - (Free Research)
New techniques are emerging to help organizations analyze security data and improve security defenses. 
(EBOOK) READ ABSTRACT |

The Event Data Warehouse- Strategies for Improving Business Performance by Hexis Cyber Solutions Inc

July 2011 - (Free Research)
Organizations are at risk if they do not plan to implement an enterprise-wide security and event data warehouse to make strategic decisions. This paper introduces Event Data Warehouse, a unique, cost effective and proven solution, that provides actionable results that enable better business decisions. 
(WHITE PAPER) READ ABSTRACT |

SenSage Security Intelligence by Hexis Cyber Solutions Inc

February 2010 - (Free Research)
This white paper will teach you about a solution that can provide you with enterprise-wide protection and also provide you with decision support when it comes to security, risk management and compliance. So don't waste anytime and see why this real-time security solution could save your enterprise from a costly security breach. 
(WHITE PAPER) READ ABSTRACT |

1 - 20 of 20

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts