IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Detection Systems  >  

Host-Based Intrusion Detection Systems (HIDS)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet.
Host-Based Intrusion Detection Systems (HIDS) Multimedia (View All Report Types)
51 - 75 of 133 Matches Previous Page  |  Next Page
Improve Customer Service and IT Service Support via Cognitive Computing
sponsored by IBM
VIDEO: Delve into the thickets of your multi-vendor IT landscape, and discover how to easily and quickly resolve your IT support problems in order to get your systems back online with cognitive computing. Tune in now to revamp your customer support with an automated technology support service.
Posted: 29 Mar 2017 | Premiered: 28 Jul 2016

IBM

Interview: The Growing Security Concerns of Industrial IoT
sponsored by Bayshore Networks
WEBCAST: In this interview, industry experts Sid Snitkin and Francis Cianfrocca discuss the emerging importance of cybersecurity for industrial IoT.
Posted: 26 May 2017 | Premiered: Mar 8, 2017

Bayshore Networks

IT Solutions Provider Fit Revamps Data Center Ecosystem for SAP Appliance Support
sponsored by Lenovo
VIDEO: Watch this video to learn how Fit achieved greater return on investment from its physical data center space—including its expansive HANA appliances—for scalable growth with the right server architecture.
Posted: 20 Mar 2017 | Premiered: 15 Mar 2017

Lenovo

Lenovo and SAP's Strategic Partnership Illuminated
sponsored by Lenovo
VIDEO: In this video, you'll delve into the strategic co-innovation SAP and Lenovo are driving with their joint customer base, to achieve success in producing business warehouse data tiering solutions, 8T S/4HANA configuration, and more. Click on now to see the essentials.
Posted: 20 Mar 2017 | Premiered: 15 Mar 2017

Lenovo

Log Management and Analytics: Your Guide
sponsored by Logentries
WEBCAST: Discover a demonstration on exactly how to successfully manage logs, server data, and analytics.
Posted: 19 Apr 2017 | Premiered: Apr 13, 2017

Logentries

Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID
WEBCAST: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: Mar 27, 2017

HID

Mobile Risks: What's Keeping CISOs up at Night
sponsored by Lookout
WEBCAST: With the rise of BYOD policies, malicious actors crave what unsecure mobile devices can unlock for them, making them a primary enterprise target. Learn what can be done to secure your employees' mobile devices and more.
Posted: 30 Mar 2017 | Premiered: Mar 30, 2017

Lookout

HP helps United Airlines consolidate their IT infrastructure
sponsored by Hewlett-Packard Enterprise
WEBCAST: This brief video case study examines how United Airlines was able to consolidate its IT infrastructure and fuel customer experience success with the right service. Tune in to learn more now.
Posted: 07 Feb 2014 | Premiered: Dec 31, 2012

Hewlett-Packard Enterprise

Hybrid ITSM: Because having one option isn't an option
sponsored by FrontRange Solutions Inc.
VIRTUAL ENVIRONMENT: This interactive resource discusses how you can make your business more efficient, compliant, and secured with the help of a hybrid IT service management solution.
Posted: 28 Jun 2013 | Premiered: 28 Jun 2013

FrontRange Solutions Inc.

IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013

IBM

IBM Security Network Intrusion Prevention System
sponsored by IBM
VIDEO: This 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.
Posted: 27 Dec 2012 | Premiered: 08 Mar 2011

IBM

IBM Service Management for Communication Service Providers
sponsored by IBM
SOFTWARE DEMO: This video shows how IBM’s Integrated Service Management for CSPs is a highly scalable solution that improves visibility, control and automation across your business.
Posted: 26 Oct 2010 | Premiered: 22 Oct 2010

IBM

Increasing Scalability and Performance with Better Endpoint Management Solutions from IBM
sponsored by IBM
WEBCAST: This webcast provides insight on an endpoint management system solution that provides the right tools to efficiently monitor current endpoint operations and security.
Posted: 09 Sep 2013 | Premiered: Sep 9, 2013

IBM

Inside IT: Stopping Security Threats in an Ever-Changing Landscape
sponsored by Intel
PODCAST: In this podcast, Intel's CISO Malcolm Harkins discusses the ever-changing security and threat landscapes and explains why adding advanced protection to your current systems is crucial to staying secure.
Posted: 27 Dec 2012 | Premiered: Dec 27, 2012

Intel

Intel Core vPro Processor Family Animations: More Secure, Manageable, and Responsive
sponsored by Intel
VIRTUAL ENVIRONMENT: In this animation, discover how a hardware-assisted approach to enterprise management can help you remotely secure your PC fleet. Learn how you can reduce deskside visits, boost energy efficiency, remotely protect corporate data from theft and loss, and more – click through now to get started.
Posted: 28 Dec 2012 | Premiered: 28 Dec 2012

Intel

Intel vPro technology resource kit
sponsored by Intel
SOFTWARE DOWNLOAD: With this free download of the Intel® vPro™ technology resource kit, learn firsthand the value of this security and management solution, find step-by-step instructions for implementing and configuring Intel vPro technology, and more – click through to download now and get started!
Posted: 31 Dec 2012 | Premiered: 18 May 2012

Intel

Join SafeNet Authentication Free Trial
sponsored by SafeNet Asia Ltd
TRIAL SOFTWARE: Experience low-maintenance and low-cost authorization controls by downloading your free 30-day trial of SafeNet Authentication Service, a cloud-based solution featuring token and self-service capabilities.
Posted: 10 Jan 2014 | Premiered: 10 Jan 2014

SafeNet Asia Ltd

Keep Endpoint Data Safe
sponsored by Code42
WEBCAST: This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014

Code42

Keeping Service Desk Simple
sponsored by Nimsoft, Inc.
WEBCAST: Access this informative webcast to learn about an innovative service desk technology that was designed to simplify service desk processes and alleviate the common issues associated with legacy service desk systems.
Posted: 11 Jul 2012 | Premiered: Jul 1, 2012

Nimsoft, Inc.

KPN focuses on Information Security with HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
Posted: 25 Nov 2013 | Premiered: Nov 25, 2013

Hewlett-Packard Enterprise

La Jolla Institute for Allergy & Immunology: Customer Video
sponsored by Absolute
VIDEO: In this on-demand video case study, learn how the right enterprise-level management software allowed La Jolla Institute for Allergy & Immunology to better manage, secure, and track all of its systems and devices.
Posted: 12 Nov 2013 | Premiered: 12 Nov 2013

Absolute

Leveraging the Cloud to Improve Endpoint Protection – Sept 6th at 10:00am (PDT) live date
sponsored by Webroot
WEBCAST: Find the answers to all of your challenging endpoint protection and web security questions by viewing this informative Webcast. Go beyond the concepts on performance effectiveness and learn the critical aspects of threat protection.
Posted: 30 Aug 2012 | Premiered: Sep 6, 2012

Webroot

Linux Without Limits: An Introductory Video
sponsored by IBM
VIDEO: In this brief video, you will discover a suite of hardware, software, services, and solutions that will empower you to unleash the full potential of Linux for your business. Tune in to deliver the flexibility and agility your organization craves with this trusted enterprise system, and scale out to 8,000 virtual servers in a single system.
Posted: 24 Feb 2016 | Premiered: 17 Aug 2015

IBM

Maximum-Strength Threat Detection for Mid-Size Enterprises
sponsored by EMC Corporation
WEBCAST: This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

McAfee Deep Defender: Hidden Malware Protection
sponsored by Intel
WEBCAST: This webcast explores a security solution that operates beyond the OS, exposing and eliminating hidden malware and stealthy threats that traditional security solutions miss. Discover how this strategy can overcome the limitations of traditional security solutions by watching now to learn more.
Posted: 02 Jan 2013 | Premiered: Jan 2, 2013

Intel
51 - 75 of 133 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement