IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Detection Systems  >  

Host-Based Intrusion Detection Systems (HIDS)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet.
Host-Based Intrusion Detection Systems (HIDS)White Papers (View All Report Types)
126 - 150 of 612 Matches Previous Page  | Next Page
Cloud-based Enterprise Identity Management Using OAuth
sponsored by Forum Systems
WHITE PAPER: This resource highlights an authentication and authorization solution that offers protection beyond the username and password-only level.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Forum Systems

Cloud-Based Security Threats Present Challenges and Opportunities for MSPs
sponsored by Webroot
WHITE PAPER: This guide explores the current cloud-based security threats and how MSPs can face the challenge head on.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

Webroot

Combat the Latest Security Attacks with Global Threat Intelligence
sponsored by IBM
WHITE PAPER: In this white paper, learn how to approach today's advanced threat landscape by first understanding the source of attacks, then developing threat intelligence to better detect and analyze new threats to help maximize defense efforts.
Posted: 06 Mar 2014 | Published: 30 Sep 2013

IBM

Combating Cybercrime - A Collective Global Response
sponsored by ThreatMetrix
WHITE PAPER: This guide explores the current threat landscape and how businesses are combating cybercrime on a global level.
Posted: 20 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

Compliance Management's Seven Steps to Success
sponsored by Infoblox
WHITE PAPER: The results of not meeting the necessary requirements are nothing but negative, including huge fines and a bad reputation. Fortunately this white paper offers a seven step guide to achieve a successful compliance management system.
Posted: 03 Dec 2013 | Published: 31 Jul 2013

Infoblox

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA, The Security Division of EMC
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Continuous Cyber Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This informative paper takes an in-depth look at continuous monitoring, describing how you can successfully deploy the technology and how it can increase visibility and streamline your security management.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Lumeta Corporation

Cost-effective, Compliance-ready Open-source Identity Management
sponsored by OpenIAM
WHITE PAPER: Access this white paper to discover a scalable, cost-effective identity management solution that improves risk management, end-user efficiency, and facilitates regulatory compliance.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

OpenIAM

Creating a Service-Oriented IT Department
sponsored by ServiceNow
WHITE PAPER: This whitepaper covers the importance of shifting your IT department from infrastructure-oriented to service-oriented.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

ServiceNow

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

CW Buyers Guide: Green IT
sponsored by ComputerWeekly.com
WHITE PAPER: This six-page Buyer’s Guide to Green IT helps CIOs and senior IT professionals to identify the issues around going green and explains the pros and cons of using third-party facilities to run IT services.
Posted: 29 Nov 2012 | Published: 26 Jan 2011

ComputerWeekly.com

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

Cloud rEvolution: A Workbook for Cloud Computing in the Enterprise
sponsored by CSC
WHITE PAPER: This white paper will get you up to speed on all aspects of cloud computing. It will help you examine cloud opportunities, review potential issues, and consider where and how specific information should be processed in your organization. Check out this white paper to learn more.
Posted: 17 Nov 2010 | Published: 17 Nov 2011

CSC

Cloud storage options for primary or nearline data
sponsored by Iomega Corporation, an EMC Company
WHITE PAPER: Cloud storage can be used for more than disaster recovery, archiving and backup. Access this E-Guide to learn why storing primary data in the could is a viable, and beneficial option.
Posted: 08 Aug 2012 | Published: 08 Aug 2012

Iomega Corporation, an EMC Company

Cloud-delivered Endpoint Security
sponsored by Webroot
WHITE PAPER: Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.
Posted: 05 Sep 2012 | Published: 30 Apr 2012

Webroot

Comparing Data Center Batteries, Flywheels, and Ultracapacitors
sponsored by APC by Schneider Electric
WHITE PAPER: This paper explores several popular classes of batteries, compares batteries to both flywheels and ultracapacitors, and briefly discusses fuel cells.
Posted: 10 Jul 2008 | Published: 01 Jul 2008

APC by Schneider Electric

Complete and Scalable Access Management
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd

Confronting the Data Center Crisis: A Cost-- Benefit Analysis of the IBM Computing on Demand (CoD) Cloud Offering
sponsored by IBM
WHITE PAPER: Through IBM client interviews across several industries and other industry and workload analyses, this paper examines the benefits and costs of IBM's CoD offering for high performance business and technical computing.
Posted: 07 Dec 2009 | Published: 09 Mar 2009

IBM

Contact Center Security: Moving to the True Cloud
sponsored by LiveOps
WHITE PAPER: Today, Cloud is one of the most talked about trends in the IT industry. It’s a paradigm many believe will have a widespread business impact. However, while the term “Cloud”is relatively new, one of the core components, distributed computing, is well-established.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

LiveOps

Control IT With Configuration Audit and Control
sponsored by Tripwire, Inc.
WHITE PAPER: Learn how establishing a change policy that enforces all changes are auditable and authorized, and all unauthorized changes are investigated, can enable IT organizations to reach compliance, security, and availability goals
Posted: 01 Mar 2007 | Published: 01 Feb 2007

Tripwire, Inc.

Cool IT Equipment Efficiently to Lower Energy Use and Cut Costs
sponsored by Upsite Technologies, Inc.
WHITE PAPER: To optimize your data center infrastructure, consider these four practical best practice steps that Upsite's engineers have devised for solving cooling inefficiencies through proper airflow management.
Posted: 14 Oct 2008 | Published: 09 Oct 2008

Upsite Technologies, Inc.

CounterTack Active Forensics: Continuous Network Monitoring for In-Progress Attacks
sponsored by CounterTack
WHITE PAPER: The security tools and strategies in use today are not enough to fight off APTs. Organizations need a new level of security that enables them to actively engage with attackers and take control of the impact of an attack in progress. Uncover how meet these needs with an active forensic system that provides better visibility and intelligence.
Posted: 22 Jun 2012 | Published: 22 Jun 2012

CounterTack

Creating an Effective Security Operations Function
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Read this white paper to understand all the activities and roles in a security operations function - your first step in making those operations more effective and efficient.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA, The Security Division of EMC

Cyber Attacks on the Rise: IBM 2007 Report
sponsored by IBM
WHITE PAPER: This white paper shows how the IBM Internet Security Systems™ X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.
Posted: 19 Nov 2007 | Published: 01 Aug 2007

IBM

Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks
sponsored by Palo Alto Networks
WHITE PAPER: In this valuable resource, discover a security platform designed to keep up with today's ever-evolving threat landscape, which offers optimum network security without lowering network performance or reducing business productivity.
Posted: 26 Dec 2013 | Published: 31 Aug 2013

Palo Alto Networks
126 - 150 of 612 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement