Search Results for: Host-based Intrusion Detection

E-Guide: How antivirus software works: Virus detection techniques
Antivirus software uses several different virus detection techniques, as described in this tip by expert Lenny Zeltser.

M86 Security

Intrusion Defense Firewall: Network-Level HIPS at the Endpoint
This white paper examines a blended approach to host intrusion defense in search optimal security combined with an ideal balance between flexibility, control, and ease of management. Specific examples highlight the benefits and pitfalls of the many different filtering techniques.

Trend Micro, Inc.

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents.

Google Apps

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents.

Google Apps

Endpoint Buyers Guide
This buyers guide provides helpful charts to assist you in choosing the endpoint protection solution that will best fit the needs of your enterprise.

Sophos

Juniper Networks Mobile Security Solution
This resource explores an innovative, market leading mobile security solution that mitigates the risks associated with deploying IP-based services.

Juniper Networks, Inc.

Endpoint Security IT Decision Center Handbook 2
Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.

TechTarget Security

Endpoint Security Technology
Access this expert e-guide for a technical overview of endpoint protection software, and learn to evaluate various vendors through valuable insight on software's different capabilities in reducing security risks for business well-being.

Symantec Corporation

A Computer Weekly buyer's guide to perimeterless network security
Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

TechTarget ComputerWeekly.com

July Technical Guide on Network Security
Attackers moving from server to server on your network can be difficult to detect, especially if they develop code that evades detection. Network threat detection is more complex and important than ever with attackers stealing payment information or other valuable data. This informative white paper outlines how to better safeguard your network.

TechTarget Security