IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Prevention Systems  >  

Host-Based Intrusion Prevention Systems (HIPS)

RSS Feed    Add to Google    Add to My Yahoo!
Host-Based Intrusion Prevention Systems (HIPS) White Papers (View All Report Types)
151 - 175 of 745 Matches Previous Page  |  Next Page
Cloud IT: The Impact of Cloud Supply Chain Platforms on the Role of IT
sponsored by GT Nexus
WHITE PAPER: In this valuable white paper learn more about the impact of cloud supply chain platforms on the role of IT and how you can better prepare your team for the challenges they may face.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

GT Nexus

Cloud Security Concerns and the Perceived Effectiveness of Traditional Security Solutions in a Cloud Environment
sponsored by CloudPassage
WHITE PAPER: The report presents research from a survey of high-level security professionals at major North American organizations on their attitudes toward cloud security, key adoption drivers, and the effectiveness of traditional security solutions in cloud environments.
Posted: 13 Jul 2015 | Published: 30 Jun 2015

CloudPassage

Cloud Security: Advanced, Efficient, and Trusted
sponsored by Unisys
WHITE PAPER: Yesterday's security has fallen behind the needs of today. Here are better ways to address threats by keeping security up to speed with the cloud.
Posted: 17 May 2016 | Published: 17 May 2016

Unisys

Combat the Latest Security Attacks with Global Threat Intelligence
sponsored by IBM
WHITE PAPER: In this white paper, learn how to approach today's advanced threat landscape by first understanding the source of attacks, then developing threat intelligence to better detect and analyze new threats to help maximize defense efforts.
Posted: 06 Mar 2014 | Published: 30 Sep 2013

IBM

Combatting Advanced Threats with Endpoint Security Intelligence
sponsored by IBM
WHITE PAPER: Read this resource to explore an integrated approach that combines the capabilities of endpoint management with security intelligence to close gaps against a malicious threat environment.
Posted: 13 May 2014 | Published: 31 Jan 2014

IBM

Combine SAP HANA Tailored DataCenter Integration with the Power of Convergence
sponsored by IBM
WHITE PAPER: With the volume of business data growing exponentially—there is a need to store, search, and analyze data in real-time to keep competition at bay. This white paper details how combining SAP HANA software and an integrated infrastructure solution can support the analysis of data from SAP within seconds.
Posted: 22 Jan 2016 | Published: 31 Dec 2015

IBM

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper offers a complete analysis of the SIEM market, including the strengths and cautions of 15 leading vendors, such as IBM Security, LogRhythm, AlienVault, McAfee, and more. Access this paper now to compare and contrast all SIEM vendors on the market.
Posted: 29 Jul 2014 | Published: 25 Jun 2014

LogRhythm, Inc.

Compete Big by Achieving Business Outcomes with Improved IT Infrastructure
sponsored by HPE and Intel®
WHITE PAPER: Access this white paper to find out how eight different companies drove significant business benefits by deploying converged infrastructure technologies.
Posted: 06 Jun 2016 | Published: 06 Jun 2016

HPE and Intel®

Complete Analysis of the Top SIEM Vendors
sponsored by AlienVault
WHITE PAPER: The Magic Quadrant summarizes Gartner's yearly analysis of the SIEM market and compares the positions of leading competitors like AlienVault. Get Gartner's complete analysis of each SIEM vendor, and learn what makes AlienVault a Visionary. View the latest report.
Posted: 07 Apr 2016 | Published: 20 Jul 2015

AlienVault

Comprehensive Protection from Today's Evolving Threats
sponsored by IBM
WHITE PAPER: Security should enhance network performance – not detract from it. Discover how an integrated security strategy can create comprehensive protection from today's evolving threats, without compromising the performance and reliability of your network.
Posted: 16 Feb 2016 | Published: 31 Mar 2013

IBM

Consolidation: The Foundation For IT and Business Transformation
sponsored by ServiceNow
WHITE PAPER: In this exclusive guide, discover a strategy that will enable you to identify and consolidate duplicative and outmoded resources in order to lower operating costs, increase efficiencies, and more.
Posted: 09 Sep 2013 | Published: 09 Sep 2013

ServiceNow

Controlling Software Asset Management in the Mobile Era
sponsored by Snow Software
WHITE PAPER: How can you balance growing user demands and at the same time ensure your company is not exposed to license liability? Discover how creating a software store tightly integrated with effective software management processes can meet these goals.
Posted: 15 Jun 2016 | Published: 15 Jun 2016

Snow Software

Cloud rEvolution: A Workbook for Cloud Computing in the Enterprise
sponsored by CSC
WHITE PAPER: This white paper will get you up to speed on all aspects of cloud computing. It will help you examine cloud opportunities, review potential issues, and consider where and how specific information should be processed in your organization. Check out this white paper to learn more.
Posted: 17 Nov 2010 | Published: 17 Nov 2011

CSC

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

Cloud storage options for primary or nearline data
sponsored by Iomega Corporation, an EMC Company
WHITE PAPER: Cloud storage can be used for more than disaster recovery, archiving and backup. Access this E-Guide to learn why storing primary data in the could is a viable, and beneficial option.
Posted: 08 Aug 2012 | Published: 08 Aug 2012

Iomega Corporation, an EMC Company

Cloud-Based Security Threats Present Challenges and Opportunities for MSPs
sponsored by Webroot
WHITE PAPER: This guide explores the current cloud-based security threats and how MSPs can face the challenge head on.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

Webroot

Cloud-delivered Endpoint Security
sponsored by Webroot
WHITE PAPER: Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.
Posted: 05 Sep 2012 | Published: 30 Apr 2012

Webroot

Comparing Data Center Batteries, Flywheels, and Ultracapacitors
sponsored by Schneider Electric
WHITE PAPER: This paper explores several popular classes of batteries, compares batteries to both flywheels and ultracapacitors, and briefly discusses fuel cells.
Posted: 10 Jul 2008 | Published: 01 Jul 2008

Schneider Electric

Complete and Scalable Access Management
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd

Confronting the Data Center Crisis: A Cost-- Benefit Analysis of the IBM Computing on Demand (CoD) Cloud Offering
sponsored by IBM
WHITE PAPER: Through IBM client interviews across several industries and other industry and workload analyses, this paper examines the benefits and costs of IBM's CoD offering for high performance business and technical computing.
Posted: 07 Dec 2009 | Published: 09 Mar 2009

IBM

Consultants: How Can You Secure Your Information with Customers?
sponsored by GlobalScape
WHITE PAPER: This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
Posted: 22 May 2014 | Published: 22 May 2014

GlobalScape

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA

Contact Center Security: Moving to the True Cloud
sponsored by LiveOps
WHITE PAPER: Today, Cloud is one of the most talked about trends in the IT industry. It’s a paradigm many believe will have a widespread business impact. However, while the term “Cloud”is relatively new, one of the core components, distributed computing, is well-established.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

LiveOps

Continuous Cyber Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This informative paper takes an in-depth look at continuous monitoring, describing how you can successfully deploy the technology and how it can increase visibility and streamline your security management.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Lumeta Corporation

Control IT With Configuration Audit and Control
sponsored by Tripwire, Inc.
WHITE PAPER: Learn how establishing a change policy that enforces all changes are auditable and authorized, and all unauthorized changes are investigated, can enable IT organizations to reach compliance, security, and availability goals
Posted: 01 Mar 2007 | Published: 01 Feb 2007

Tripwire, Inc.
151 - 175 of 745 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement