5 Results for:Information security program management

  • Filter by: 

Security Information Management Systems and Application Monitoring

sponsored by SearchSecurity.com Published: 24 Apr 2013 eGuide

Did you know your security information management (SIM) system can shed light on application performance issues? This E-Guide details a four-step process for integrating apps into your SIM. View now to learn more!

View Now

Magic Quadrant for Security Information and Event Management

sponsored by LogRhythm, Inc. Published: 03 Dec 2018 Research Content

Security and risk management leaders increasingly seek SIEM solutions with capabilities that support early targeted attack detection and response. Users must balance advanced SIEM capabilities with the resources ...

View Now

Tips on Managing the Deluge of Information Security Threat Reports

sponsored by SearchSecurity.com Published: 02 Dec 2013 eGuide

Don't get overwhelmed by today's cyber-attacks: Access this expert e-guide to take advantage of threat report data and use it as actionable intelligence. Read on to discover the real impact of insider security ...

View Now

Open Information Security Management Maturity Model (O-ISM3)

sponsored by ComputerWeekly.com Published: 12 Jan 2011 White Paper

The O-ISM3 is The Open Group framework for managing information security and information in the Open Information Security Management Maturity Model (O-ISM3) wider context. It aims to ensure that security processes ...

View Now

Best Practices for Cloud Compliance, Secure Backup, and Successful Information Management

sponsored by SearchSecurity.com Published: 11 Jul 2013 eGuide

This E-Guide explores the keys to maintaining control over increasingly large data sets from a compliance, backup and information management perspective.

View Now