IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Detection Systems  >  

Host-Based Intrusion Detection Systems (HIDS)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet.
Host-Based Intrusion Detection Systems (HIDS) White Papers (View All Report Types)
51 - 75 of 949 Matches Previous Page  |  Next Page
7 Data Loss Prevention Suite Providers Compared
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: In this report, Forrester Research identified, researched, and analyzed 7 top data loss prevention providers. Learn how each provider measures up and discover how to make an educated decision in choosing which might be the best for your enterprise.
Posted: 02 Feb 2017 | Published: 08 Nov 2016

Symantec & Blue Coat Systems

7 Questions to Ask Before Choosing a Threat Intelligence Feed for Web-Based Threats
sponsored by The Media Trust
WHITE PAPER: Learn 7 questions that you need to ask of your threat intelligence feed to determine what's best for your enterprise's security, what makes a truly valuable threat intelligence feed, and more.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

The Media Trust

7 Questions to Ask Your Dynamic Application Security Scanning Vendor
sponsored by Rapid7
WHITE PAPER: In this white paper, learn 7 questions you should ask any application security vendor about their dynamic application security testing (DAST) capabilities before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017


7 Ways to Make Yourself Harder to Hack
sponsored by Solarwinds MSP
WHITE PAPER: Whether you call it layered security or defense in depth, layers of control buys you time to respond effectively. Access now to learn more about integrated tools that cover security and network management for MSPs.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

Solarwinds MSP

7 Features You'll Find in the Most Advanced DLP Systems
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn seven key features to look for when evaluating a DLP system, and how each one overlaps with the others to provide your enterprise with optimal protection.
Posted: 01 May 2017 | Published: 01 May 2017

Symantec & Blue Coat Systems

8 Things to Know About a Secure Web Gateway
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This guide reveals 8 considerations for secure web gateways. Learn about proxy technology, why powerful cloud-based application controls are key, and 6 more must-know aspects of secure web gateways.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

Symantec & Blue Coat Systems

9 Ways to Solve the GDPR Compliance Challenge
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This white paper explores 9 technologies that can help you meet GDPR compliance and avoid the hefty fines associated with it.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Symantec & Blue Coat Systems

A Guide to Essential Analytics Tools for New Healthcare Models
sponsored by SAS
WHITE PAPER: In this resource, you will compare the differing types of episode analytics, and discover how healthcare providers use these analytics for payment bundling in real-world scenarios. Read on now to discover how to reduce variations that will negatively impact care outcomes and lead to higher costs.
Posted: 06 Jan 2016 | Published: 31 Dec 2014

SAS

A Guide to Safely Adopting Office 365
sponsored by Symantec + Blue Coat
WHITE PAPER: Access this white paper for tips on how you can safely adopt Office 365. Learn where Office 365 fails to protect your organization and how to mitigate those shortcomings to prevent data exposures, safeguard against unauthorized user activity, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Symantec + Blue Coat

A Practical Process for Incident Response
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to put together a practical approach to incident response in light of today's threat landscape with a 4-step incident response process.
Posted: 01 May 2017 | Published: 01 May 2017

Proofpoint, Inc.

A Security Delivery Platform Benefits the Entire Organization
sponsored by Gigamon
WHITE PAPER: As the cybersecurity threat landscape continues to evolve, organizations need to start taking into account current and future cybersecurity trends. Examine a solution that provides the network visibility you need to improve protection.
Posted: 09 Jun 2016 | Published: 09 Jun 2016

Gigamon

A Security Intelligence and Analytics Platform That Helps You Neutralize Cyber Threats
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper you'll learn about an intelligence and analytics platform that allows you to detect and neutralize cyber threats in real-time. Find out how you can centralize your visibility to eliminate data silos, automatically contextualize over 750 data sources to get the most up-to-data view of your security protocols, and more.
Posted: 10 Oct 2016 | Published: 31 Jul 2016

LogRhythm, Inc.

8 Essentials of Business Analytics
sponsored by SAS
WHITE PAPER: Leading banks use business analytics to predict and prevent credit fraud, saving millions. Retailers use business analytics to predict the best location for stores and how to stock them. But these advanced business applications tell only part of the story. What's going on inside these market-leading companies that sets them apart?
Posted: 29 Jul 2010 | Published: 29 Jul 2010

SAS

A Business Risk Approach to IT Governance
sponsored by IBM
WHITE PAPER: Learn best practices for assessing overall effectiveness in today's highly distributed organizations and how to manage IT risks. Also discover the role a centralized IT governance system can play in realizing your IT governance strategy.
Posted: 20 Jul 2016 | Published: 30 Sep 2011

IBM

A Buyer's Guide to Endpoint Protection Platforms
sponsored by Intel Security
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

Intel Security

A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER: This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012

Vormetric

A Comprehensive Guide to the Latest Threat Detection Technologies
sponsored by SearchSecurity.com
WHITE PAPER: This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com

A Guide to Password Use in WebSphere Application Server
sponsored by Global Knowledge
WHITE PAPER: Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge

A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls
sponsored by Sophos, Inc.
WHITE PAPER: Unified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM system.
Posted: 20 Dec 2013 | Published: 30 Nov 2013

Sophos, Inc.

A Manifesto for Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Symantec Corporation

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper so you can gain a better understanding of the definition of SIEM and log management tools and what they can do for you. Find out more about the features of SIEM and what you should look for when selecting a product.
Posted: 01 Oct 2012 | Published: 01 Oct 2012

Tripwire, Inc.

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

A Roadmap for Big Data in Security Analytics
sponsored by EMC Corporation
WHITE PAPER: Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

EMC Corporation
51 - 75 of 949 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement