IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Detection Systems  >  

Host-Based Intrusion Detection Systems (HIDS)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet.
Host-Based Intrusion Detection Systems (HIDS)White Papers (View All Report Types)
76 - 100 of 780 Matches Previous Page  | Next Page
All the Unusual Suspects
sponsored by Software AG
WHITE PAPER: This exclusive whitepaper breaks down the who, what, where, when, and why of automated surveillance in the financial market.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Software AG

An Approach to Security Frameworks
sponsored by Symantec Corporation
WHITE PAPER: This exclusive whitepaper will show you how to meet compliance frameworks while also improving security levels.
Posted: 29 Oct 2014 | Published: 23 Sep 2014

Symantec Corporation

Analyst's take: Microsoft Dynamics CRM boosts customer service and company profits
sponsored by ComputerWeekly.com
WHITE PAPER: Microsoft Dynamics CRM enables organizations to improve customer service, effectively manage marketing and communications, and increase sales productivity, ultimately driving increased profits and reduced costs.
Posted: 21 Oct 2011 | Published: 11 Feb 2011

ComputerWeekly.com

Anatomy of a Cyber-Attack: How Cyber Criminals Operate, and How You Can Stop Them
sponsored by Icomm Technologies
WHITE PAPER: In this informative resource, get an inside look the basic steps of a cyber-attack, from reconnaissance to intrusion to malware insertion, as well as new integrated security solutions that can help prevent these malicious activities from disrupting your business.
Posted: 17 Sep 2014 | Published: 31 Dec 2012

Icomm Technologies

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
sponsored by Dell Software
WHITE PAPER: Sophisticated exploits that utilize advanced evasion techniques are all too common. Anti-evasion data-normalizing techniques are critical to an effective IPS, since evasions that aren't decoded and detected effectively render the IPS useless.
Posted: 12 May 2014 | Published: 12 May 2014

Dell Software

Applying the Four Standards of Security-Based CIA
sponsored by Global Knowledge
WHITE PAPER: High levels of optimization help to ensure that an organization's information security approach is both well-rounded and flexible enough to meet current and future threats.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

Global Knowledge

Are you securing the right things? How to effectively secure your data
sponsored by ComputerWeekly.com
WHITE PAPER: The idea of putting walls around the network is being replaced by a drive to understand what really needs to be secured and how to secure it. This paper examines the relative merits of the different approaches.
Posted: 21 Oct 2011 | Published: 13 Oct 2010

ComputerWeekly.com

Assess IT as a service : Enterprise Cloud Services–Virtual Private Cloud, Proof of Concept
sponsored by Hewlett-Packard Limited
WHITE PAPER: Read this white paper to learn how you can test out enterprise cloud services – specifically the virtual private cloud – and see how it performs in conjunction with your current systems.
Posted: 16 Aug 2012 | Published: 16 Aug 2012

Hewlett-Packard Limited

Attacks on Point of Sale Systems
sponsored by Symantec Corporation
WHITE PAPER: Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Symantec Corporation

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes the capabilities of LogRhythm's automation suite for NERC CIP compliance, which helps organizations improve their overall security and compliance posture while reducing costs.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Avoid HIPAA Compliance Violations Amid the Rise of BYOD
sponsored by Imprivata
WHITE PAPER: This expert e-guide from SearchHealthIT.com offers 5 tips on how to secure a mobility strategy so that HCOs can enjoy the benefits of a more flexible workforce while maintaining HIPAA compliance.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Imprivata

Avoiding Common Pitfalls of Evaluating and Implementing DCIM Solutions
sponsored by Schneider Electric
WHITE PAPER: In this white paper, you will uncover the three common pitfalls of deploying DCIM software and how to avoid them. DCIM automates and simplifies your data center, but misuse and carelessness do not provide the ROI your organization expects.
Posted: 14 Nov 2014 | Published: 01 Nov 2012

Schneider Electric

Backup and Compliance: End-to-End Visibility into the Backup Environment
sponsored by APTARE
WHITE PAPER: This short white paper explores a data protection solution that provides end-to-end visibility to ensure sustainable compliance.
Posted: 02 Jul 2013 | Published: 28 Jun 2013

APTARE

Analog to IP Migration Strategy
sponsored by Sony Electronics Asia Pacific Pte Ltd
WHITE PAPER: This resource notes the trend in high-definition (HD) video cameras for enhanced video surveillance, and how the migration from analog to IP can be customized to fit your organization's needs.
Posted: 08 Oct 2013 | Published: 08 Oct 2013

Sony Electronics Asia Pacific Pte Ltd

Analyzing Four Widely Exploited Java Vulnerabilities
sponsored by FireEye
WHITE PAPER: This informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

FireEye

Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
sponsored by Dell, Inc.
WHITE PAPER: This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

Dell, Inc.

Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track Security
WHITE PAPER: For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security

Applying Security Holistically from the Cloud
sponsored by CloudAccess
WHITE PAPER: Consult this informative white paper to learn how the paradigm has shifted to security that's developed, deployed and managed from the cloud. Learn how to implement a holistic security strategy to protect all data in the enterprise.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

CloudAccess

Are You Ready For a New Era in B2B Collaboration?
sponsored by IBM
WHITE PAPER: This white paper examines what companies can do to modernize their approach to business-to-business collaboration in response to trends like globalization, consumerization, and mobility.
Posted: 03 Sep 2014 | Published: 31 Mar 2014

IBM

As data grows, so do the risks: How to improve data and app sec
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 06 Nov 2013 | Published: 30 Sep 2012

IBM

AT&T Business Continuity Survey: 2008
sponsored by AT&T Corp
WHITE PAPER: The goal of this business continuity survey was to learn what these executives were doing about business continuity, and how it figured in their overall IT strategy.
Posted: 06 Oct 2008 | Published: 04 Oct 2008

AT&T Corp

Automated Log Analytics Critical For Security and Compliance Management
sponsored by VMware, Inc.
WHITE PAPER: Access this resource to uncover a new category of log analytics tools to accommodate the trend in virtual and cloud infrastructures for efficient troubleshooting, security, and compliance management.
Posted: 15 Oct 2013 | Published: 01 Jun 2013

VMware, Inc.

Automated Penetration Testing; Can IT Afford Not To?
sponsored by Core Security Technologies
WHITE PAPER: This paper contains an overview of penetration testing, a summary of vulnerabilities that can be revealed through penetration testing, and the business and technical benefits of performing penetration testing across your infrastructure.
Posted: 18 Jan 2007 | Published: 01 Jan 2007

Core Security Technologies

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett-Packard Company

Battling Modern Botnets
sponsored by FireEye
WHITE PAPER: The FBI ranks cybercrime among its top priorities in part because botnets are proliferating at an alarming rate, crossing corporate boundaries and spreading infections behind corporate firewalls. Learn how FireEye provides advance detection and a blended approach to today’s botnet problem that "traditional" solutions do not.
Posted: 01 Sep 2009 | Published: 28 Apr 2008

FireEye
76 - 100 of 780 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement