IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Detection Systems  >  

Host-Based Intrusion Detection Systems (HIDS)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet.
Host-Based Intrusion Detection Systems (HIDS) Multimedia (View All Report Types)
1 - 25 of 128 Matches Previous Page  |  Next Page
3 Tips for Virtual Environments and the Modern Data Center
sponsored by Commvault
VIDEO: Your hybrid IT strategy needs to include a plan for modernizing the data center assets you own and operate, including the virtual environments that you rely on every day. Discover how to avoid adding a new management tool for every new piece of infrastructure or cloud that is adopted into the hybrid IT estate.
Posted: 11 Aug 2017 | Premiered: 31 Jul 2017

Commvault

Amelco Case Study: Continuous Delivery Using Ansible Automation
sponsored by Red Hat
VIDEO: Tune in as Amelco illustrates how one IT automation engine empowered effective multi-environment management for its diverse application infrastructure—with no downtime. Learn here how to unify management and provide continuous delivery of Linux-based apps, and more.
Posted: 16 Jan 2017 | Premiered: 01 Sep 2016

Red Hat

Ansible Tower 3: An Introductory Look
sponsored by Red Hat
VIDEO: Give your team the power to scale: Learn how to manage complex, multi-tier application deployments and trouble-shooting with an IT automation framework. View now to end repetitive tasks, speed productivity, and scale IT initiatives by centralizing control of your infrastructure.
Posted: 12 Jan 2017 | Premiered: 20 Jul 2016

Red Hat

Ansible Tower Demo: The Case for IT Orchestration
sponsored by Red Hat
VIDEO: Do you have a framework for automating IT systems? Learn how to integrate Ansible Tower orchestration and IT configuration with your own Linux server or cloud instance. Download now to see if agentless IT automation is right for your organization's app infrastructure.
Posted: 16 Jan 2017 | Premiered: 16 Jan 2017

Red Hat

Azure Security and Identity Management Best Practices
sponsored by Rackspace
WEBCAST: Watch this free on-demand webinar and learn how to develop an identity and authentication cloud strategy, use Azure as your base infrastructure, develop a core set of VM best practices, and leverage security managed services for security operations and compliance assistance.
Posted: 12 Aug 2016 | Premiered: Aug 12, 2016

Rackspace

Become a Champion of PCI Compliance by Minimizing Your Attack Surface
sponsored by Centrify Corporation
PRODUCT DEMO: Don't miss your chance to download a free trial of a privileged identity management tool that will help you meet the latest PCI DSS regulatory requirements. Access now to receive guidance on the best deployment option for your business needs, technical support for the duration of the evaluation process, and more.
Posted: 28 Jun 2017 | Premiered: 28 Jun 2017

Centrify Corporation

Building and Instrumenting the Next Generation SOC
sponsored by LogRhythm, Inc.
WEBCAST: Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Uplevel Security, discuss best practices for building and staffing today's SOC for maximum effectiveness.
Posted: 13 Apr 2017 | Premiered: Apr 13, 2017

LogRhythm, Inc.

Case Study: How Secrid Stays Connected to Sell Globally
sponsored by NetSuite
VIDEO: Watch this 2 minute case study to learn how Secrid, a secure wallet designer based in the Netherlands, uses a platform to sell their products around the world and coordinate with sales teams in an easy-to-navigate environment.
Posted: 17 Oct 2016 | Premiered: 16 Mar 2016

NetSuite

Case Study: IT Automation at Allegiant Airlines
sponsored by Red Hat
VIDEO: Tune into this case study to see how Allegiant Airlines saves 10-15 man hours per week managing their Linux systems with an IT automation and configuration tool. Discover how to automate all systems simultaneously to empower DevOps initiatives within your enterprise.
Posted: 13 Jan 2017 | Premiered: 13 Jan 2017

Red Hat

Cherwell Service Management Product Overview Video
sponsored by Cherwell
VIDEO: If you organization is looking to implement, update, or automate ITSM, watch this brief video to learn about Cherwell Service Management software and its key features, including out of the box ITIL certified processes, a modern, intuitive self-service portal, codeless technology, and more.
Posted: 12 Apr 2017 | Premiered: 06 Sep 2016

Cherwell

Cloud-Based Cybersecurity for Industrial IoT Apps
sponsored by Bayshore Networks
VIDEO: In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.
Posted: 30 May 2017 | Premiered: 30 Nov 2016

Bayshore Networks

8 Common Mistakes of Windows 7 Migration
sponsored by DellEMC and Intel®
WEBCAST: Join this interactive webcast to learn more about:• Common mistakes that people make during the OS migration project • How Dell overcame mistakes we made during our migration • How Dell helped other companies overcome common mistakes • Goodness that came out of the migration program
Posted: 15 Apr 2011 | Premiered: Apr 27, 2011, 12:00 EDT (16:00 GMT)

DellEMC and Intel®

A Brazilian company adopts IBM System z to handle rapid business growth
sponsored by IBM
WEBCAST: This on-demand video case study explains how Sicoob, Brazil's largest cooperative credit system, achieved high performance and scalability by investing in the right server platform, allowing the company to accommodate business growth.
Posted: 21 Feb 2014 | Premiered: May 29, 2013

IBM

A free Demonstration of Panda Cloud Systems Management
sponsored by Panda Security
SOFTWARE DEMO: Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

Panda Security

Achieving Rapid Data Recovery for IBM AIX Environments: An Executive Overview of EchoStream for AIX
sponsored by Vision Solutions
PODCAST: This podcast looks closely at a unique data recovery solution for IBM AIX Environments called EchoStream for AIX.
Posted: 09 May 2008 | Premiered: May 9, 2008

Vision Solutions

Actuate Performancesoft Suite Product Tour
sponsored by Actuate
SOFTWARE DEMO: An effective method of monitoring and managing metrics is critical to increasing the performance of any organization. Learn how to gain visibility into all areas of concern and leverage insight into operations that stakeholders demand to ensure success.
Posted: 17 May 2007 | Premiered: 17 May 2007

Actuate

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AlienVault
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AlienVault

ArcSight Case Study: Vodafone
sponsored by ArcSight, an HP Company
VIDEOCAST: Vodafone, the world's leading mobile communications group, uses ArcSight Enterprise Threat and Risk Management platform to get a consolidated global view of security, increase the efficiency in security operations and increase the reaction time to cyberattacks or security breaches.
Posted: 10 Mar 2011 | Premiered: Mar 10, 2011

ArcSight, an HP Company

Balancing Cost Control with Strategic Investments
sponsored by Cisco Systems, Inc.
PODCAST: Listen to this podcast as the Senior Director and Lead in the European Markets for Cisco's Internet Business Solutions Group, explores how CIOs balance cost containment with making strategic investments that will help their businesses accelerate growth today and into the future.
Posted: 16 Mar 2011 | Premiered: Mar 16, 2011

Cisco Systems, Inc.

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST: Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)

Trend Micro

CA ARCserve Backup r12.5 SRM Features
sponsored by arcserve
VIDEO: CA ARCserve Backup r12.5 uses a three-tier architecture within a domain. Check out this demonstration for an explanation of the CA ARCserve Backup r12.5 SRM Features, including architecture, dashboard overview, nodes and tiers, and SRM probe.
Posted: 28 May 2010 | Premiered: 28 May 2010

arcserve

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

CORE IMPACT Pro V10
sponsored by Core Security Technologies
PRODUCT DEMO: Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
Posted: 30 Dec 2009 | Premiered: 30 Dec 2009

Core Security Technologies

Cyber Defense Managed Service - A Force Multiplier Webinar
sponsored by Verdasys
VIRTUAL SEMINAR: Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size.
Posted: 10 Jun 2013 | Premiered: 27 Jun 2013

Verdasys

Deep Defender Demo Video
sponsored by Intel
WEBCAST: Cyber criminials have begun to design malware that can infiltrate security. View this informative webcast to learn more about what you can do to eliminate vulnerabilities and prepare for potential attacks. Stay ahead of criminals by viewing this resource now
Posted: 03 Oct 2012 | Premiered: Oct 3, 2012

Intel
1 - 25 of 128 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement