Security Information and Event Management Reports

10 types of security incidents and how to handle them
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cyberattacks are more varied than ever. Learn the key symptoms that signal a problem and how to respond to keep systems and data safe.
Posted: 05 Sep 2022 | Published: 06 Sep 2022

TechTarget ComputerWeekly.com

Endpoint threat detection gets more response
sponsored by Hewlett Packard Enterprise
EGUIDE: Discover how security teams worldwide are attempting to stop cyber-threats using various security methods and endpoint tools. InfoSec professionals have to evaluate what's best for their organizations and make the best judgment at the time -- knowing full well that today's security approach may become tomorrow's liability.
Posted: 07 Jul 2016 | Published: 06 Jul 2016

Hewlett Packard Enterprise

SIEM Analyst Research Bundle
sponsored by AT&T Cybersecurity
WHITE PAPER: No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

AT&T Cybersecurity

Resource Center: How to Safeguard Data
sponsored by McAfee, Inc.
RESOURCE: This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

McAfee, Inc.

Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE: In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017

Bayshore Networks

Go Beyond Just Securing Your Cloud, Make it Better
sponsored by McAfee, Inc.
RESOURCE CENTER: Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

McAfee, Inc.

Optimize Your SIEM Operations
sponsored by McAfee, Inc.
RESOURCE CENTER: Access articles detailing everything from common mistakes made in SIEM application to maturing and specializing your enterprise's approach to breach mitigation and recovery.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

McAfee, Inc.

5 IAM Trends Shaping the Future of Security
sponsored by Beta Systems
EGUIDE: Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
Posted: 02 Nov 2020 | Published: 28 Oct 2020

Beta Systems

User Behavioral Analytics Tools Can Thwart Security Attacks
sponsored by Preempt Security
EGUIDE: Inside this expert e-guide, Johna Till Johnson explores the emerging world of User Behavioral Analytics (UBA) and how it can give you a clear view into what should, and what should not, be going on in your virtual environment. Inside you'll find a breakdown of the features a UBA provides, and a basic deployment plan to get your program running.
Posted: 31 Oct 2016 | Published: 31 Oct 2016

Preempt Security

Incident Response Tools Can Help Automate Your Security
sponsored by Cisco Umbrella and Dimension Data
EGUIDE: In this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.
Posted: 29 Mar 2017 | Published: 22 Mar 2017

Cisco Umbrella and Dimension Data