IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Detection Systems  >  

Host-Based Intrusion Detection Systems (HIDS)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet.
Host-Based Intrusion Detection Systems (HIDS) White Papers (View All Report Types)
151 - 175 of 796 Matches Previous Page  |  Next Page
CEO Fraud: How to Stop Impersonation Attacks
sponsored by Mimecast
WHITE PAPER: The following resource shows the results of 500 surveyed organizations that were victimized by whaling attacks. Access now to identify the impact of whaling attacks on other companies, so you can take the right safeguards in place.
Posted: 25 May 2016 | Published: 25 May 2016


Changes to Spark the IT Revolution
sponsored by ServiceNow
WHITE PAPER: This white paper covers the important changes IT needs to make in order to keep up with tech savvy employees and emerging technology trends.
Posted: 02 Dec 2013 | Published: 02 Dec 2013


CIOs: 3 IT Imperatives to Transform the Enterprise
sponsored by ServiceNow
WHITE PAPER: This resource presents key insights from a recent CIO leadership forum in which senior IT leaders shared strategies for IT innovation. Learn the 3 imperatives that these leaders used to transform their enterprise.
Posted: 10 Mar 2016 | Published: 10 Mar 2016


Cloud App and Service Adoption: 11 Key Steps IT Should Take
sponsored by Symantec + Blue Coat
WHITE PAPER: You need to know which cloud service providers will break your fall in the event of unauthorized access to critical data. Uncover 11 steps to secure adoption for cloud apps and services.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

Symantec + Blue Coat

Cloud Computing Security Considerations and Requirements
sponsored by Palo Alto Networks
WHITE PAPER: In an era where the cloud is considered nontraditional, securing it shouldn't be either. Learn how to segment your applications and data, centrally manage and automate security deployments, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Cloud Computing Services: What's Your Enterprise IT Forecast
sponsored by Windsor Group
WHITE PAPER: This informational white paper identifies five essential characteristics that define cloud computing as well as how to use these to your advantage. Furthermore it predicts how enterprise cloud computing can enable day-to-day operations in ways traditional IT arrangements cannot.
Posted: 16 Sep 2016 | Published: 01 Jul 2016

Windsor Group

Cloud IT: The Impact of Cloud Supply Chain Platforms on the Role of IT
sponsored by GT Nexus
WHITE PAPER: In this valuable white paper learn more about the impact of cloud supply chain platforms on the role of IT and how you can better prepare your team for the challenges they may face.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

GT Nexus

Cloud Security Spotlight Report
sponsored by Palerra Inc.
WHITE PAPER: This comprehensive research report explores the specific drivers and risk factors of cloud infrastructure, how organizations are using the cloud, whether the promise of the cloud is living up to the hype, and how organizations are responding to the security threats in these environments.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Palerra Inc.

Combat Escalating Threats to Your Data Center
sponsored by Juniper Networks, Inc.
WHITE PAPER: This brief discusses the security threats that businesses are facing in the data center, the consequences of substandard or nonexistent security measures, and primary strategies for these problems. Access now to learn more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Juniper Networks, Inc.

Combat the Latest Security Attacks with Global Threat Intelligence
sponsored by IBM
WHITE PAPER: In this white paper, learn how to approach today's advanced threat landscape by first understanding the source of attacks, then developing threat intelligence to better detect and analyze new threats to help maximize defense efforts.
Posted: 06 Mar 2014 | Published: 30 Sep 2013


Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014


Cisco 2014 Annual Security Report
sponsored by Sourcefire
WHITE PAPER: This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Posted: 01 Apr 2014 | Published: 01 Apr 2014


Cisco 2014 Annual Security Report
sponsored by Cisco
WHITE PAPER: This information-packed resource acts as a guide for developing a robust security approach given today's issues with trust, threat intelligence, and varying industry trends. Click through to explore key findings, as well as recommendations for your next steps.
Posted: 31 Mar 2014 | Published: 31 Mar 2014


Cisco 2014 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Cisco Systems, Inc.

Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Posted: 23 Apr 2014 | Published: 28 Feb 2014

Cisco Systems, Inc.

Cisco Mobile Security Survey: Research Highlights
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read the results of a recent international mobile security survey to see highlighted findings and discover solutions for productive, flexible, and secure network access.
Posted: 24 Jan 2014 | Published: 31 Aug 2013

Cisco Systems, Inc.

Cisco Smart Business Architecture
sponsored by Cisco
WHITE PAPER: This white paper covers a network architecture solution that can allow you to expand while also maintaining effective security.
Posted: 09 Jan 2014 | Published: 07 Feb 2013


CISO Guide to Next Generation Threats
sponsored by FireEye
WHITE PAPER: The only way to protect yourself against next generation threats is to have next generation protection. Traditional firewalls, IPS, anitivirus, and signature based systems are still useful against known threats, but they don't stand a chance against new ones
Posted: 17 May 2011 | Published: 16 May 2011


Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013


Closing the Biggest Hole in Web Application Delivery
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper explores a strategy for closing the biggest hole in web application delivery.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

CA Technologies.

Cloud rEvolution: A Workbook for Cloud Computing in the Enterprise
sponsored by CSC
WHITE PAPER: This white paper will get you up to speed on all aspects of cloud computing. It will help you examine cloud opportunities, review potential issues, and consider where and how specific information should be processed in your organization. Check out this white paper to learn more.
Posted: 17 Nov 2010 | Published: 17 Nov 2011


Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

Cloud storage options for primary or nearline data
sponsored by Iomega Corporation, an EMC Company
WHITE PAPER: Cloud storage can be used for more than disaster recovery, archiving and backup. Access this E-Guide to learn why storing primary data in the could is a viable, and beneficial option.
Posted: 08 Aug 2012 | Published: 08 Aug 2012

Iomega Corporation, an EMC Company

Cloud-Based Security Threats Present Challenges and Opportunities for MSPs
sponsored by Webroot
WHITE PAPER: This guide explores the current cloud-based security threats and how MSPs can face the challenge head on.
Posted: 15 Apr 2014 | Published: 31 Dec 2013


Cloud-delivered Endpoint Security
sponsored by Webroot
WHITE PAPER: Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.
Posted: 05 Sep 2012 | Published: 30 Apr 2012

151 - 175 of 796 Matches Previous Page    5 6 7 8 9 10    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement