IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Detection Systems  >  

Host-Based Intrusion Detection Systems (HIDS)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet.
Host-Based Intrusion Detection Systems (HIDS) White Papers (View All Report Types)
151 - 175 of 772 Matches Previous Page  |  Next Page
Case Study: Achieving Next Generation Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: This case study describes how a managed care provider strengthened its security by obtaining visibility into all endpoints across the network.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

Case Study: How a Leading Bank Monitors All Its Data
sponsored by Varonis
WHITE PAPER: This case study describes how a leading bank gained the ability to monitor every bit of its data, down to the last file touch.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Varonis

Case Study: How University of Glasgow Scaled its Intrusion Detection System to Support 30,000 Users
sponsored by Gigamon
WHITE PAPER: In this white paper, you'll discover how one IDS infrastructure solution helped the IT professionals at the University of Glasgow upgrade their limited network for easier monitoring and increased protection.
Posted: 13 Apr 2015 | Published: 27 Jun 2014

Gigamon

Case Study: State Agency Bolsters Security & Operational Efficiencies
sponsored by Splunk
WHITE PAPER: This case study describes how the Nevada Department of Transportation enhanced its security and its efficiency with better log management.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Splunk

Case Study: Strong Authentication Provides Intellectual Property Security
sponsored by SafeNet, Inc.
WHITE PAPER: This case study describes how outerwear company O'Neill adopted a new authentication solution to heighten the security of its valuable intellectual property.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

SafeNet, Inc.

CIOinsight: Managing IT Complexity in the Enterprise (Full Report)
sponsored by SAP America, Inc.
WHITE PAPER: The following white paper examines the many causes and effects of IT complexity and offers insight for CIOs on how to properly address this dilemma. Access now and learn how to alleviate the stress of IT complexity now and for initiatives down the road.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

SAP America, Inc.

Cloud Computing Solutions to App Delivery Issues
sponsored by Red Hat
WHITE PAPER: This white paper highlights one PaaS solution in particular, complete with automation technologies built on secure cloud architecture. Read on to learn how PaaS could make life easier for your application developers, IT operations staff, enterprise architects, and more.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Red Hat

Cloud Endpoint Security: Considerations for Cloud Security Services and Management
sponsored by Symantec Corporation
WHITE PAPER: In this comprehensive e-guide, experts Mike Chapple and Kevin Tolly explain the need for cloud security services. Uncover their take on five different cloud endpoint security services on the market today.
Posted: 22 Nov 2013 | Published: 22 Nov 2013

Symantec Corporation

Cloud IT: The Impact of Cloud Supply Chain Platforms on the Role of IT
sponsored by GT Nexus
WHITE PAPER: In this valuable white paper learn more about the impact of cloud supply chain platforms on the role of IT and how you can better prepare your team for the challenges they may face.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

GT Nexus

Cloud Security Concerns and the Perceived Effectiveness of Traditional Security Solutions in a Cloud Environment
sponsored by CloudPassage
WHITE PAPER: The report presents research from a survey of high-level security professionals at major North American organizations on their attitudes toward cloud security, key adoption drivers, and the effectiveness of traditional security solutions in cloud environments.
Posted: 13 Jul 2015 | Published: 30 Jun 2015

CloudPassage

Cloud-Based Security Threats Present Challenges and Opportunities for MSPs
sponsored by Webroot
WHITE PAPER: This guide explores the current cloud-based security threats and how MSPs can face the challenge head on.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

Webroot

Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

NetIQ

Cisco 2014 Annual Security Report
sponsored by Sourcefire
WHITE PAPER: This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Sourcefire

Cisco 2014 Annual Security Report
sponsored by Cisco
WHITE PAPER: This information-packed resource acts as a guide for developing a robust security approach given today's issues with trust, threat intelligence, and varying industry trends. Click through to explore key findings, as well as recommendations for your next steps.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

Cisco

Cisco 2014 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Cisco Systems, Inc.

Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Posted: 23 Apr 2014 | Published: 28 Feb 2014

Cisco Systems, Inc.

Cisco Mobile Security Survey: Research Highlights
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read the results of a recent international mobile security survey to see highlighted findings and discover solutions for productive, flexible, and secure network access.
Posted: 24 Jan 2014 | Published: 31 Aug 2013

Cisco Systems, Inc.

Cisco Smart Business Architecture
sponsored by Cisco
WHITE PAPER: This white paper covers a network architecture solution that can allow you to expand while also maintaining effective security.
Posted: 09 Jan 2014 | Published: 07 Feb 2013

Cisco

CISO Guide to Next Generation Threats
sponsored by FireEye
WHITE PAPER: The only way to protect yourself against next generation threats is to have next generation protection. Traditional firewalls, IPS, anitivirus, and signature based systems are still useful against known threats, but they don't stand a chance against new ones
Posted: 17 May 2011 | Published: 16 May 2011

FireEye

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

Closing the Biggest Hole in Web Application Delivery
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper explores a strategy for closing the biggest hole in web application delivery.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

CA Technologies.

Cloud rEvolution: A Workbook for Cloud Computing in the Enterprise
sponsored by CSC
WHITE PAPER: This white paper will get you up to speed on all aspects of cloud computing. It will help you examine cloud opportunities, review potential issues, and consider where and how specific information should be processed in your organization. Check out this white paper to learn more.
Posted: 17 Nov 2010 | Published: 17 Nov 2011

CSC

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

Cloud storage options for primary or nearline data
sponsored by Iomega Corporation, an EMC Company
WHITE PAPER: Cloud storage can be used for more than disaster recovery, archiving and backup. Access this E-Guide to learn why storing primary data in the could is a viable, and beneficial option.
Posted: 08 Aug 2012 | Published: 08 Aug 2012

Iomega Corporation, an EMC Company

Cloud-delivered Endpoint Security
sponsored by Webroot
WHITE PAPER: Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.
Posted: 05 Sep 2012 | Published: 30 Apr 2012

Webroot
151 - 175 of 772 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement