IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Prevention Systems  >  

Host-Based Intrusion Prevention Systems (HIPS)

RSS Feed    Add to Google    Add to My Yahoo!
Host-Based Intrusion Prevention Systems (HIPS)White Papers (View All Report Types)
76 - 100 of 613 Matches Previous Page  | Next Page
Behavioral Analytics Applied to Security
sponsored by FileTrek
WHITE PAPER: This white paper details a new approach to threat detection that leverages big data and behavioral analytics technology to improve data protection and risk prevention.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FileTrek

Best Practices for Selecting a Vulnerability Management (VM) Solution
sponsored by Qualys
WHITE PAPER: This guide explores some best practices for deploying a VM solution and outlines how it is essential for your security strategy.
Posted: 15 Apr 2014 | Published: 16 May 2013

Qualys

Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
WHITE PAPER: This informative guide explores best practices for choosing a Web application scanning solution.
Posted: 15 Apr 2014 | Published: 16 May 2013

Qualys

Best Practices for Utilizing Network Monitoring Switches in Cisco Environments
sponsored by Ixia
WHITE PAPER: Access this white paper to discover how network monitoring switches can help overcome the challenges of deploying packet-based monitoring in a Cisco network.
Posted: 03 Mar 2014 | Published: 31 Mar 2013

Ixia

Beyond the Next Generation: Meeting the Converging Demands of Network Security
sponsored by IBM
WHITE PAPER: Read this whitepaper to learn more about rising to the converging demands of network security. Topics covered include the evolution of network security, the development of "next-generation" approaches, use cases and more.
Posted: 04 Sep 2013 | Published: 30 Sep 2012

IBM

Big Security for Big Data
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource details how to make security event management simple, intelligent, efficient, and manageable, despite the issues big data creates. View now to learn more!
Posted: 02 Apr 2013 | Published: 31 Dec 2012

Hewlett-Packard Company

Big Threats for Small Businesses
sponsored by FireEye
WHITE PAPER: Data breaches are bad for business, but it can mean the end for small firms. This guide takes a look at today's threat landscape and explores cybercrime trends towards small and midsize businesses.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

FireEye

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 21 Aug 2013 | Published: 31 May 2013

IBM

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 20 Mar 2014 | Published: 31 May 2013

IBM

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource highlights results of a 4-question survey about network security, and what IT managers are looking for in a solution to address their top problems.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

Hewlett-Packard Company

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Hewlett-Packard Company

Building An Intelligence - Driven Security Operations Center
sponsored by EMC Corporation
WHITE PAPER: Access this white paper for insider tips on rapid cyber threat detection and remediation as well as how to coordinate technologies, personnel, and processes for better security.
Posted: 26 Sep 2013 | Published: 28 Feb 2013

EMC Corporation

Benefits of High Sensitivity with the IPELA ENGINE™
sponsored by Sony Electronics Asia Pacific Pte Ltd
WHITE PAPER: In this white paper, discover a low-light performance video camera application that can capture detailed color images to enhance security teams' abilities to easily identify security threats indoors and outdoors.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

Sony Electronics Asia Pacific Pte Ltd

Benefits of View-DR with the IPELA ENGINE™
sponsored by Sony Electronics Asia Pacific Pte Ltd
WHITE PAPER: In this white paper, discover a video system that offers high-sensitivity video quality for advanced surveillance, allowing security teams to get clear images at all times of the day.
Posted: 09 Oct 2013 | Published: 18 Jun 2013

Sony Electronics Asia Pacific Pte Ltd

Best Practices for Cloud Security
sponsored by Qualys
WHITE PAPER: In this essential white paper, discover the benefits that your organization can realize by embracing cloud services, including more effective and cost-efficient security. Also inside, discover cloud cautions and pitfalls to avoid – read on now to learn more.
Posted: 22 Jan 2013 | Published: 31 Jan 2012

Qualys

Best Practices in Securing Your Customer Data in Salesforce, Force.com, and Chatter
sponsored by CipherCloud
WHITE PAPER: Many organizations want to move to the Salesforce platform, but concerns about data security, privacy, residency, and compliance have held them back. This whitepaper outlines best practices in securing sensitive customer data in Salesforce and outlines "must have" capabilities to overcome emerging cloud threats.
Posted: 07 Aug 2012 | Published: 07 Aug 2012

CipherCloud

Beyond Job Scheduling:The Road To Enterprise Process Automation
sponsored by UC4 Software, Inc
WHITE PAPER: This white paper demonstrates the ever-increasing value of enterprise process automation and outlines a set of requirements for truly achieving it.
Posted: 11 Aug 2011 | Published: 31 Dec 2010

UC4 Software, Inc

Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

Beyond Passwords: A Fine-Grained Approach to Privileged Identity Management
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the risks associated with privileged accounts and details how a privileged management tool helps reduce risk, improve compliance, and – above all – boost security and protect your organization from insider threats.
Posted: 18 Jul 2013 | Published: 31 Jan 2013

CA Technologies.

BI for Small and Mid-sized Businesses
sponsored by LogiXML
WHITE PAPER: This paper dispels some myths about BI in smaller companies and outlines the main options at your disposal.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

LogiXML

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012

Symplified

Building an Extranet Portal
sponsored by Juniper Networks, Inc.
WHITE PAPER: The need for organizations to provide network access for external audiences such as partners & customers is increasing. This paper details the benefits of an extranet portal & highlights SSL VPN technology as a best approach to achieve increase...
Posted: 27 Oct 2006 | Published: 01 Sep 2006

Juniper Networks, Inc.

Building Capabilities Leveraging Alternate Solution Deployments
sponsored by SAP America, Inc.
WHITE PAPER: This white paper explores the delivery methods and strategies for achieving versatile, agile and powerful IT capabilities. Inside, learn about the need for service and application orchestration, as well as cutting edge strategies for meeting a new generation of business needs.
Posted: 30 Jun 2011 | Published: 30 Jun 2011

SAP America, Inc.

Business Intelligence in SAP Environments
sponsored by IBM
WHITE PAPER: This paper discusses the disruptions to SAP’s roadmap after the acquisition of BOBJ, and discusses various scenarios in which customers might decide to stay with SAP BOBJ for its BI strategy, and also when it might be best to use a third-party BI platform to leverage their SAP investments. Read this paper to learn more.
Posted: 22 Jun 2010 | Published: 26 May 2010

IBM

Business Intelligence on a Budget: Is Software as a Service Business Intelligence right for your organization?
sponsored by Indicee
WHITE PAPER: With no upfront cost and minimal effort required for set up, SaaS BI solutions are ideal for small to mid-sized businesses, for addressing specific business needs or when few IT resources are available. SaaS BI solutions quickly provide access to critical reporting and analysis without the time needed for a full-blown on-premise BI implementation.
Posted: 05 Apr 2010 | Published: 05 Apr 2010

Indicee
76 - 100 of 613 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement