IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Detection Systems  >  

Host-Based Intrusion Detection Systems (HIDS)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet.
Host-Based Intrusion Detection Systems (HIDS) Multimedia (View All Report Types)
76 - 100 of 127 Matches Previous Page  |  Next Page
Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

SearchSecurity.com

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

SIM for Threat Monitoring Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This lesson helps enterprises learn how to catalog the types of threats that they confront, and goes on to identify those which could be addressed through the expedient use of a SIEM approach.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Simplify Cloud Access and Provisioning with a Federated Identity Service
sponsored by Radiant Logic, Inc.
WEBCAST: Delve into the identity integration issues that arise when enterprises connect to cloud applications. Discover how to overcome the challenges by creating a place to authenticate users, utilize a global reference image to provision to cloud apps, and simplify the management of users and groups.
Posted: 05 Aug 2016 | Premiered: Feb 19, 2016

Radiant Logic, Inc.

Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: Discover a six-step methodology that helps you operationalize the detection of a security incident using your existing SIEM.
Posted: 26 Jul 2016 | Premiered: Jul 26, 2016

AlienVault

Software-Defined Parallel Powered Productivity
sponsored by DataCore Software Corporation
WEBCAST: Data storage isn't easy - data keeps growing, apps need more performance and new servers are hard to integrate and manage. Rather than continuously adding servers in attempt to solve your IT challenges, learn to exploit the full potential of your storage infrastructure and minimize I/O performance gaps through software-based storage virtualization.
Posted: 09 Aug 2016 | Premiered: Aug 8, 2016

DataCore Software Corporation

Next-Generation Firewalls: Breaking Through the Hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School resource cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 01 Feb 2015 | Premiered: 10 Dec 2013

SearchSecurity.com

Online Trial: Rational System Architect
sponsored by IBM
SOFTWARE DOWNLOAD: Try IBM® Rational® System Architect® V11.3, which enables business managers and IT professionals to plan, model, and execute changes to improve their business strategy and process as well as the IT systems and infrastructure that support them, enabling successful enterprise planning and transformation.
Posted: 04 Nov 2009 | Premiered: 04 Nov 2009

IBM

PCI DSS v3.0: How to Adapt your Compliance Strategy
sponsored by AlienVault
WEBCAST: With version 3.0 of PCI DSS now available, it's time to review your compliance strategy and make a plan for adapting to the revised requirements. View this webcast to learn more about the significant changes related to malware defenses, vulnerability assessments and penetration testing.
Posted: 20 Dec 2013 | Premiered: Dec 20, 2013

AlienVault

Podcast: Why SSL Security Matters
sponsored by Thawte Inc.
PODCAST: Download this podcast for an overview of Secure Sockets Layer, why you should use it, and what you need to do to defend yourself against common SSL attacks.
Posted: 04 Feb 2013 | Premiered: Feb 4, 2013

Thawte Inc.

PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

Practitioners Guide to Establishing a SOC Webinar
sponsored by AlienVault
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AlienVault

Preventing Cyber-Attacks with Big Data Security Analytics and SIEM
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 03 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.

Privacy Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Discover the questions you should be addressing while researching a cloud security provider. Listen in to learn key insights such as: don't make assumptions on what security is and isn't included, find out how the provider handles data security and privacy, and more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Intel Security

Quest Software - Data Protection Simplified
sponsored by Dell Software
VIDEOCAST: In this videocast you'll learn about solutions for physical, virtual, cloud and application data protection and what you need to do to ensure your data is both protected and accessible.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Dell Software

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Enterprise

Redefine Possible in the Hybrid Cloud and Beyond
sponsored by EMC Corporation
WEBCAST: Join David Goulden – CEO of EMC Information Infrastructure – on July 8, 2014, for a special presentation regarding the new innovations that are reshaping storage, data protection, cloud computing, big data, and more. Read on now for more information.
Posted: 03 Jul 2014 | Premiered: Jul 8, 2014, 14:00 EDT (18:00 GMT)

EMC Corporation

Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without altering the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015

FinalCode

Security Virtual Jam Session: The Secured Enterprise
sponsored by IBM
WEBCAST: Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders.
Posted: 08 Feb 2008 | Premiered: Feb 21, 2008, 11:00 EST (16:00 GMT)

IBM

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple
sponsored by Lumension
VIRTUAL SEMINAR: Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.
Posted: 12 Sep 2012 | Premiered: 25 Sep 2012

Lumension

Selecting the Right Class Server UPS
sponsored by Eaton
WEBCAST: This brief video offers key insight to help you select the server-class uninterruptible power supply (UPS) that meets your short- and long-term business needs.
Posted: 17 Jan 2014 | Premiered: Jan 17, 2014

Eaton

SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AlienVault
WEBCAST: Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013

AlienVault

Software-Defined Security for the Software-Defined Infrastructure
sponsored by Intel Security
VIDEO: Learn how a software-defined security approach can help you to improve the security for software-defined infrastructures (SDI) and simplify security management when you're ready for virtualization. Watch now to find out how this approach works and how you can provision security when and where it's needed.
Posted: 06 May 2016 | Premiered: 12 Feb 2016

Intel Security
76 - 100 of 127 Matches Previous Page    2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement