SIEM Reports

Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE: In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

What are Threat Intelligence Services?
sponsored by Unisys
EGUIDE: To help identify advanced attacks, a variety of vendors have created threat intelligence services. In this guide, you'll discover what threat intelligence services entail, learn how they work and uncover how these services differ. Determine whether these services can reduce the risk that specific types of threats pose to your enterprise.
Posted: 13 Oct 2016 | Published: 12 Oct 2016

Unisys

Cisco ASA 5500 Series Adaptive Security Appliances
sponsored by Cisco Systems, Inc.
DATA SHEET: Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.
Posted: 28 Aug 2017 | Published: 09 Jun 2009

Cisco Systems, Inc.

Building a Strong and Effective Incident Response Plan
sponsored by ServiceNow
EGUIDE: Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.
Posted: 08 Feb 2021 | Published: 23 Oct 2019

ServiceNow

Ponemon - Costs and Consequences of Gaps in Vulnerability Response
sponsored by ServiceNow
WHITE PAPER: Ponemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.
Posted: 08 Feb 2021 | Published: 06 Aug 2020

ServiceNow

Resolve Web Security Issues with Industry Experts' Advice
sponsored by Veracode, Inc.
EGUIDE: Learn how to bridge the communication divide between app developers and security pros, as well as foster secure coding practices in your enterprise to mitigate the vulnerabilities in your web applications.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

Container Security: How to Secure Enterprise Container Stacks
sponsored by NeuVector
EGUIDE: Learn the basics of container security and how to best secure your container stacks. Discover tools available to plug potential security holes and strategies to keep your organization secure.
Posted: 05 Dec 2016 | Published: 02 Dec 2016

NeuVector

User Behavioral Analytics Tools Can Thwart Security Attacks
sponsored by Preempt Security
EGUIDE: Inside this expert e-guide, Johna Till Johnson explores the emerging world of User Behavioral Analytics (UBA) and how it can give you a clear view into what should, and what should not, be going on in your virtual environment. Inside you'll find a breakdown of the features a UBA provides, and a basic deployment plan to get your program running.
Posted: 31 Oct 2016 | Published: 31 Oct 2016

Preempt Security

How To Get the Most Out of SOCs
sponsored by ServiceNow
EGUIDE: This e-guide teaches you how to refocus your security efforts on detection through continuous monitoring and greater network visibility. Learn how to set up your security operations center (SOC) to achieve more timely detection capabilities and learn from industry-recognized security expert Eric Cole, on how to get the most out of SOCs.
Posted: 07 Sep 2016 | Published: 31 Aug 2016

ServiceNow

What to Know about SIEM as a Service
sponsored by LogRhythm, Inc.
EGUIDE: Recently, SIEM products residing in cloud environments have caught the attention of users looking to improve their security posture. In this e-guide, expert Frank Siemons touches upon SIEM as a service and what you need to know before deploying this approach.
Posted: 15 Feb 2018 | Published: 06 Feb 2018

LogRhythm, Inc.