IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Detection Systems  >  

Host-Based Intrusion Detection Systems (HIDS)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet.
Host-Based Intrusion Detection Systems (HIDS)White Papers (View All Report Types)
101 - 125 of 691 Matches Previous Page  | Next Page
Beyond Passwords: A Fine-Grained Approach to Privileged Identity Management
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the risks associated with privileged accounts and details how a privileged management tool helps reduce risk, improve compliance, and – above all – boost security and protect your organization from insider threats.
Posted: 18 Jul 2013 | Published: 31 Jan 2013

CA Technologies.

Beyond the Breach
sponsored by FireEye
WHITE PAPER: This informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.
Posted: 04 Jun 2014 | Published: 04 Jun 2014

FireEye

Beyond the Next Generation: Meeting the Converging Demands of Network Security
sponsored by IBM
WHITE PAPER: Read this whitepaper to learn more about rising to the converging demands of network security. Topics covered include the evolution of network security, the development of "next-generation" approaches, use cases and more.
Posted: 04 Sep 2013 | Published: 30 Sep 2012

IBM

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 21 Aug 2013 | Published: 31 May 2013

IBM

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 20 Mar 2014 | Published: 31 May 2013

IBM

Build a network perimeter for the mobile age
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper examines how your organization can meet the challenges of securing and managing a modern network by embracing a perimeter model based on logical controls that consistently enforce enterprise policy wherever an asset is located.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Palo Alto Networks

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Hewlett-Packard Company

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Business Transformation: Exploring the Requirements of a Strategic Business Transformation
sponsored by Hewlett-Packard Limited
WHITE PAPER: To keep up with market demands and trends, it is important for organizations to transform their business. This guide explores business transformation and how it reduces risk and cost
Posted: 19 Nov 2013 | Published: 19 Nov 2013

Hewlett-Packard Limited

Buyers guide to next-gen firewalls
sponsored by Palo Alto Networks
WHITE PAPER: In this resource, uncover a buyers guide for next-generation firewalls that details all the must-have functions in order to ensure optimum network security. Click now to see how to choose the right solution for your organization's needs.
Posted: 26 Dec 2013 | Published: 26 Dec 2013

Palo Alto Networks

BI for Small and Mid-sized Businesses
sponsored by LogiXML
WHITE PAPER: This paper dispels some myths about BI in smaller companies and outlines the main options at your disposal.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

LogiXML

Breach Prevention Industry Best Practices & Standards Data Sheet: Industry Perspectives – Healthcare
sponsored by Symantec Corporation
WHITE PAPER: This informative paper examines how you can build a formidable breach prevention strategy designed specifically for healthcare.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Symantec Corporation

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012

Symplified

Building an Extranet Portal
sponsored by Juniper Networks, Inc.
WHITE PAPER: The need for organizations to provide network access for external audiences such as partners & customers is increasing. This paper details the benefits of an extranet portal & highlights SSL VPN technology as a best approach to achieve increase...
Posted: 27 Oct 2006 | Published: 01 Sep 2006

Juniper Networks, Inc.

Building An Intelligence - Driven Security Operations Center
sponsored by EMC Corporation
WHITE PAPER: Access this white paper for insider tips on rapid cyber threat detection and remediation as well as how to coordinate technologies, personnel, and processes for better security.
Posted: 26 Sep 2013 | Published: 28 Feb 2013

EMC Corporation

Building Capabilities Leveraging Alternate Solution Deployments
sponsored by SAP America, Inc.
WHITE PAPER: This white paper explores the delivery methods and strategies for achieving versatile, agile and powerful IT capabilities. Inside, learn about the need for service and application orchestration, as well as cutting edge strategies for meeting a new generation of business needs.
Posted: 30 Jun 2011 | Published: 30 Jun 2011

SAP America, Inc.

Business Intelligence in SAP Environments
sponsored by IBM
WHITE PAPER: This paper discusses the disruptions to SAP’s roadmap after the acquisition of BOBJ, and discusses various scenarios in which customers might decide to stay with SAP BOBJ for its BI strategy, and also when it might be best to use a third-party BI platform to leverage their SAP investments. Read this paper to learn more.
Posted: 22 Jun 2010 | Published: 26 May 2010

IBM

Business Intelligence on a Budget: Is Software as a Service Business Intelligence right for your organization?
sponsored by Indicee
WHITE PAPER: With no upfront cost and minimal effort required for set up, SaaS BI solutions are ideal for small to mid-sized businesses, for addressing specific business needs or when few IT resources are available. SaaS BI solutions quickly provide access to critical reporting and analysis without the time needed for a full-blown on-premise BI implementation.
Posted: 05 Apr 2010 | Published: 05 Apr 2010

Indicee

Business Intelligence: The Definitive Guide for Midsize Organizations
sponsored by SAP America, Inc.
WHITE PAPER: Business intelligence (BI) allows organizations to better understand, analyze, and even predict what's occurring in their company.
Posted: 09 Jun 2008 | Published: 01 Jun 2008

SAP America, Inc.

Business Rules and Gap Analysis: Discovery and Management of Business Rules Avoids Business Disruptions
sponsored by Micro Focus, Ltd
WHITE PAPER: This paper will assess how to locate and account for functionality gaps. It will also illustrate a methodology for realigning applications with business goals.
Posted: 04 Dec 2009 | Published: 23 Nov 2009

Micro Focus, Ltd

Business Strategy for Cloud Providers: The Case for Potential Cloud Services Providers
sponsored by IBM
WHITE PAPER: This paper is focused on helping those who want to emerge aswinners in the new cloud provider marketplace. Read on to learn tips for creating a winning cloud provider business strategy and model.
Posted: 21 Sep 2010 | Published: 29 Sep 2009

IBM

Business Transformation Through Telepresence
sponsored by AT&T Corp
WHITE PAPER: Check out this research brief as it explores key findings to maximize business telepresence value by understanding how telepresence works as an enabler for business transformation. Learn how best-in-class organizations deploy telepresence to gain business value and see benefits that drive top-line growth.
Posted: 16 Jun 2011 | Published: 16 Jun 2011

AT&T Corp

Business Value of Sterling Commerce Managed Services for B2B Integration
sponsored by Sterling Commerce, An IBM Company
WHITE PAPER: Increasing cost controls and unpredictable cost increases are leading many enterprises to rethink how they support their business-to-business (B2B) operations. As a result, many enterprises are choosing to outsource B2B integration by partnering with a managed services provider.
Posted: 11 Sep 2009 | Published: 01 Sep 2009

Sterling Commerce, An IBM Company

Buyer's Criteria for Advanced Malware Protection
sponsored by Sourcefire
WHITE PAPER: This guide explores the current state of malware in today's threat landscape and discusses some of the top strategies for stopping sophisticated malware.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Sourcefire

Buyer's Criteria for Next-Generation Network Security
sponsored by Sourcefire
WHITE PAPER: This whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire
101 - 125 of 691 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement