PCI Compliance Made Simple
sponsored by Alert Logic
WHITE PAPER:
Major data breaches have caused untold damage. These unfortunate events have led to the creation of a data security standard (PCI DSS) that all payment card industry members must comply to. This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1 and discusses best practices to achieve PCI compliance.
Posted: 20 Jul 2009 | Published: 20 Feb 2008
|
|
|
Business Continuity Self-Assessment Tool
sponsored by IBM Software Group
WHITE PAPER:
The Business Continuity Self Assessment Tool is a step toward becoming a more resilient business. After completing the assessment, you will be able to view a personalized graph that identifies potential gaps within the business and event threat areas.
Posted: 26 Jul 2007 | Published: 09 Apr 2007
|
|
|
Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER:
This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008
|
|
|
eGuide: Expert Tips for Deploying Secure Messaging Technologies
sponsored by TechTarget Security
WHITE PAPER:
This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
Posted: 24 Oct 2008 | Published: 22 Oct 2008
|
|
|
Protecting SharePoint Data Long Term
sponsored by Varonis
WHITE PAPER:
This paper focuses on SharePoint access control management challenges, identifies best practices that need to be considered, and demonstrates how Varonis can help.
Posted: 30 Jul 2009 | Published: 30 Jul 2009
|
|
|
Hitachi IT Operations Analyzer: Root Cause Analysis for Supporting Fault Identification
sponsored by Hitachi Vantara
WHITE PAPER:
Hitachi Data Systems introduces Hitachi IT Operations Analyzer software with unique Root Cause Analysis functionality. The IT Operations Analyzer is a powerful, proven approach to simplifying IT infrastructure management, with comprehensive performance and availability monitoring of up to 250 server, network and storage nodes.
Posted: 04 Jun 2009 | Published: 01 May 2009
|
|
|
Corporate networks: Business 2.0 and beyond
sponsored by SonicWALL
WHITE PAPER:
The performance and security needs of corporate networks have evolved greatly in the last five years. This brochure provides a management overview of what's changed and why. But more importantly, it shows why flexibility, visibility, agility and affordability are now the key factors in network decision-making. Read on to learn more.
Posted: 29 Oct 2009 | Published: 24 Jul 2009
|
|
|
Energy Logic: Calculating and Prioritizing Your Data Center IT Efficiency Actions
sponsored by Emerson Network Power
WHITE PAPER:
This paper reviews the challenges of measuring data center energy efficiency and proposes a solution: a new metric called CUPS, or Compute Units per Second, that allows data center managers to calculate data center efficiency.
Posted: 07 Jul 2009 | Published: 07 Jul 2009
|
|
|
Solaris 10 Operating System Innovation Matters-Increase Business Efficiency and Lower Costs
sponsored by Sun Microsystems, Inc.
WHITE PAPER:
The Solaris OS is the strategic platform for today's demanding enterprise and is the only open operating system that has delivered proven results, running everything from mission-critical enterprise databases to high performance Web farms.
Posted: 02 Dec 2008 | Published: 27 Nov 2008
|
|
|
The Splunk Guide to SIEM Replacement
sponsored by Splunk
EBOOK:
Replacing a SIEM is a major decision for an organization. And now more than ever, best-in-class security operations require a modern SIEM solution that will power the SOC of the future. This e-book will help answer key questions on your SIEM replacement journey. Read on now to learn how you can get started.
Posted: 29 Oct 2024 | Published: 29 Oct 2024
|
|
|
Critical Capabilities for Security Information and Event Management
sponsored by Splunk
GARTNER RESEARCH REPORT:
Splunk was ranked first in every Use Case in the 2024 Gartner® Critical Capabilities for Security Information and Event Management report. The report assessed SIEM capabilities for three different Use Cases against the increasingly complex vendor landscape. Download the latest Gartner report now to learn more.
Posted: 29 Oct 2024 | Published: 29 Oct 2024
|
|
|
Security Information and Event Management (SIEM)
sponsored by Splunk
WHITE PAPER:
Download “The Essential Guide to SIEM” to discover how a top-tier SIEM solution can help you make sense of data noise, increase operational efficiency by unifying threat detection, and more.
Posted: 29 Oct 2024 | Published: 29 Oct 2024
|
|
|
The Hidden Costs of a SIEM: The Need for a New Approach
sponsored by Centripetal Networks
BLOG:
Maintaining a SIEM system can bring hidden costs, from data storage to compliance requirements. Learn how to mitigate these challenges and optimize your SIEM operations. Read the full blog post to discover strategic solutions.
Posted: 02 Dec 2024 | Published: 03 Dec 2024
|
|
|
SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 08 Feb 2021 | Published: 21 Dec 2020
|
|
|
Choosing Between MDR, MSSP, and SIEM-as-a-Service
sponsored by Arctic Wolf
EBOOK:
MDR, MSSP, SIEM-as-a-service: Which one is the right fit for your security operations? To help you make an informed decision, this 16-page e-book compares the approaches. Dive in to understand the strengths and weaknesses of each security strategy.
Posted: 21 Feb 2024 | Published: 21 Feb 2024
|
|
|
A Computer Weekly buyer's guide to SIEM and SOAR
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The question of how to use data has big implications on a company's performance. In this 16-page buyer's guide, Computer Weekly looks at how SIEM and SOAR tools assist IT teams, why security tools require strong internal security processes to work effectively and what role they have in a rapidly changing cyber threat landscape.
Posted: 09 Sep 2021 | Published: 09 Sep 2021
|
|
|
CW APAC - March 2020: Expert Advice: Security Operations Centre
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.
Posted: 08 Feb 2021 | Published: 19 Mar 2020
|
|
|
Converging Platforms: How Do XDR, SIEM, and SOAR Compare?
sponsored by Arctic Wolf
EBOOK:
This e-book discusses the emergence of extended detection and response (XDR), and how it compares to security information and event management (SIEM) and security orchestration, automation, and response (SOAR) toolsets. Read on to get started.
Posted: 23 Jul 2022 | Published: 23 Jul 2022
|
|
|
Infographic: SIEM vs. SOAR vs. XDR
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
IT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.
Posted: 09 Feb 2022 | Published: 09 Feb 2022
|
|
|
Magic Quadrant for Security Information and Event Management
sponsored by Splunk
GARTNER MAGIC QUADRANT:
Splunk is proud to be named a leader for Security Information and Event Management (SIEM). This report defines SIEM as a configurable security system of record that aggregates and analyzes security event data from on-premises and cloud environments. Read this report to learn more.
Posted: 29 Oct 2024 | Published: 29 Oct 2024
|
|
|
ecuring Civilian Agencies Next-Gen SIEM for Enhanced Protection
sponsored by CrowdStrike
WEBCAST:
Civilian organizations are increasingly being exposed to advanced threats. In this webcast, experts from CrowdStrike break down their mission to secure civilian agencies with next-gen SIEM for enhanced protection. Watch the webcast now to learn more about Falcon Next-Gen SIEM.
Posted: 23 Oct 2024 | Premiered: Oct 23, 2024
|
|
|
Computer Weekly - 17 August 2021: How to choose between SIEM and SOAR
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, our buyer's guide examines the use of SIEM and SOAR to improve IT security, and asks which you should use, and when? We look at what you need to know about NVMe over Fabrics, the emerging storage networking technology. And we find out how Oracle customers are introducing its Fusion Cloud suite. Read the issue now.
Posted: 16 Aug 2021 | Published: 17 Aug 2021
|
|
|
Fortinet Named a Challenger in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management
sponsored by Fortinet, Inc.
PRODUCT OVERVIEW:
Fortinet named a Challenger in the 2024 Gartner Magic Quadrant for Security Information and Event Management. Learn how Fortinet's FortiSIEM platform offers advanced ITOT security analytics, AI-driven detection, and multi-tenant capabilities for enterprises and MSSPs. Download the full Gartner report to learn more.
Posted: 21 May 2024 | Published: 21 May 2024
|
|
|
Computer Weekly - 7 September 2021: Highways England delivers a digital roadmap
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We also explore SIEM and SOAR security tools and we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now.
Posted: 06 Sep 2021 | Published: 07 Sep 2021
|
|
|
Computer Weekly - 24 August 2021: How datacentre power growth is leaving Dublin in distress
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at the challenges faced by Dublin's datacentre sector, as growth leaves the city's electricity infrastructure creaking. We ask whether recent initiatives to close the UK's digital skills gaps are working. And we examine the latest injustice to hit the Post Office Horizon scandal. Read the issue now.
Posted: 20 Aug 2021 | Published: 24 Aug 2021
|
|
|
Accelerate Cyberattack Detection and Response
sponsored by Fortinet, Inc.
INFOGRAPHIC:
Fortinet security operations solutions accelerate cyberattack detection & response. This infographic summarizes time & effort savings from leveraging their SOC analytics, SIEM, SOAR, advanced threat detection/protection. Read the full overview to learn capabilities & benefits.
Posted: 15 Mar 2024 | Published: 15 Mar 2024
|
|
|
Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Jun 2020
|
|
|
Far Beyond the Firewall – Experiencing Alert Fatigue From Your Overwhelmed Firewall?
sponsored by Centripetal Networks
BLOG:
Existing security strategies that combine SIEM, EDR/XDR, anti-malware, network firewalls, and more sound effective on paper, yet they often focus too heavily on identifying threats, rather than establishing layers of defense to insulate your enterprise’s critical assets. Learn more about building a layered security defense in this blog.
Posted: 25 Jun 2024 | Published: 25 Jun 2024
|
|
|
Cortex extended security intelligence and automation management (XSIAM)
sponsored by Palo Alto Networks
EBOOK:
In the last few years, the needs of the security operations center (SOC) have changed, but the tools that they use have not. Extended security intelligence and automation management (XSIAM) uses a combination of automated and human-based controls to more rapidly and accurately remediate threats. Read on to learn more.
Posted: 08 Nov 2023 | Published: 08 Nov 2023
|
|
|
Checklist: Nine Cost Considerations for Observability Platforms
sponsored by Chronosphere
EGUIDE:
The shift to cloud native creates a new need for data managementWith the increase in data volume, sources and destinations, companies need more comprehensive tools.
Posted: 12 Dec 2024 | Published: 12 Dec 2024
|
All resources sponsored by Chronosphere
|
|
What is a Telemetry Pipeline?
sponsored by Chronosphere
EGUIDE:
The shift to cloud native creates a new need for data managementWith the increase in data volume, sources and destinations, companies need more comprehensive tools.
Posted: 12 Dec 2024 | Published: 12 Dec 2024
|
All resources sponsored by Chronosphere
|
|
How to Plan for Tomorrow’s SOC, Today
sponsored by Palo Alto Networks
EBOOK:
Discover in this e-book the 5 Steps and 4 Keys to transforming security operations to combat advanced attacks and improve SOC efficiencies, so you can plan for tomorrow’s SOC, today.
Posted: 24 Apr 2024 | Published: 24 Apr 2024
|
|
|
Cortex XSIAM The Machine-Led, Human-Empowered Security Platfrom
sponsored by Palo Alto Networks
EBOOK:
Cortex XSIAM is a new AI-driven security platform that unifies data, analytics, and automation to transform the security operations center. It delivers dramatically better attack protection with minimal analyst involvement. Read the e-book to learn how Cortex XSIAM can outpace threats and streamline your security operations.
Posted: 23 Nov 2024 | Published: 25 Nov 2024
|
|
|
Unified Risk Posture: A CISO’s Guide To Reducing Risk And Complexity
sponsored by Cloudflare
WHITE PAPER:
As cybersecurity risks expand, CISOs need a unified approach to evaluate, exchange, and enforce risk posture across users, apps, and data. Learn how to simplify risk management and optimize security investments in this e-book.
Posted: 13 Jul 2024 | Published: 13 Jul 2024
|
|