Search Results for: Host-based Intrusion Detection

Build a Cohesive, Effective Security Strategy
Discover how to identify redundancy in your security tools in order to cut costs and increase efficiency. Plus, learn how you can effectively integrate global threat intelligence into your strategy to bolster your security arsenal.

Splunk

Cyberhunting: A Critical Component of Enterprise Security
Cyberhunting – actively looking for signs of compromise in an organization and controlling and minimizing the overall damage – must be a part of your security program. Learn more about this proactive security approach, and how to implement it within your organization, in this e-guide.

Infocyte

Securing Virtualized Data Centers
On the surface, virtualized datacenters appear to have all of the same vulnerabilities and security challenges as conventional datacenters. With virtual machines, new challenges minimize the effectiveness of traditional protections. Read on to learn what it takes to secure today’s virtualized data centers.

Trend Micro, Inc.

Fighting Crimeware
Strengthen your security with these expert insights into fighting advanced crimeware.

TechTarget Security

Information Security Asean March 2016
Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals

TechTarget

Granular application control, intelligence and real-time visualization
It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or completely blocked.

SonicWALL

HP Security Breach Management Solution brief
Download this exclusive whitepaper to learn about defining, detecting, defending, and deterring threats before they bring your company to its knees.

Hewlett-Packard Enterprise

Active defence through deceptive IPS
This article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks

TechTarget ComputerWeekly.com

Cybersecurity Is Every CIO's Problem
This CIO handbook gives you the knowledge you need to create cybersecurity that not only keeps you safe, but also builds trust among consumers and other businesses.

TechTarget CIO

Cybersecurity Is Every CIO's Problem
As breaches mount, many CIOs are finding that enterprise cybersecurity is a competitive advantage and are showing the business how security investments bolster the bottom line.

TechTarget CIO