IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Host Intrusion Detection

RSS Feed    Add to Google    Add to My Yahoo!
Host Intrusion Detection White Papers (View All Report Types)
 
A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

Fortinet, Inc.

Making a Business Case for Fraud Prevention Technology
sponsored by IBM
WHITE PAPER: This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

IBM

Intrusion Detection and Prevention Learning Guide
sponsored by SearchSecurity.com
WHITE PAPER: This guide is a compilation of resources that explain what intrusion detection and prevention are, how they work, troubleshooting, configurations and more. Download the key to protecting your network.
Posted: 17 May 2007 | Published: 03 Oct 2005

SearchSecurity.com

Getting the Most from Your Wireless Network
sponsored by WildPackets, Inc.
WHITE PAPER: Network disruptions have become business disruptions with financial and sometimes even legal consequences. This white paper outlines best practices in monitoring, analyzing, and troubleshooting wireless networks using WildPackets OmniPee.
Posted: 26 Aug 2008 | Published: 26 Aug 2008

WildPackets, Inc.

Gartner's Magic Quadrant for E-mail Security Boundary, 2006
sponsored by Symantec Hosted Services
WHITE PAPER: The increasing need for email security has resulted in a growing number of available solutions to evaluate. Download this Gartner white paper to learn what to look for when choosing an email security solution for your small to medium-sized business.
Posted: 23 Oct 2006 | Published: 25 Sep 2006

Symantec Hosted Services

Enterprise-Grade Wireless LAN Security
sponsored by Siemens
WHITE PAPER: This white paper outlines the considerations that should be taken into account to ensure a successful enterprise-wide deployment of a secure wireless network.
Posted: 14 Nov 2006 | Published: 01 Sep 2005

Siemens

Simplifying Network Security with a Single Source Provider
sponsored by Perimeter eSecurity
WHITE PAPER: Read this whitepaper for a look at how, if done properly, reducing the number of security vendors or only selecting one vendor for multiple services is a great way for organizations to manage costs, obtain needed expertise, and expand security services.
Posted: 04 Dec 2008 | Published: 04 Dec 2008

Perimeter eSecurity

Security Appliances: New Strides in Preventing Intrusions
sponsored by IBM
WHITE PAPER: According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

Real World Intrusion Prevention (IPS) for the Demands of a New Security Reality
sponsored by TippingPoint
WHITE PAPER: This whitepaper addresses primary areas that organizations must consider when evaluating possible solutions for intrusion prevention. Topics include: key network security challenged facing enterprises today; criteria for an effective IPS solution; And insights gained from enterprises already deploying IPS solutions in the real world.
Posted: 26 Aug 2009 | Published: 25 Aug 2009

TippingPoint

CounterTack Active Forensics: Continuous Network Monitoring for In-Progress Attacks
sponsored by CounterTack
WHITE PAPER: The security tools and strategies in use today are not enough to fight off APTs. Organizations need a new level of security that enables them to actively engage with attackers and take control of the impact of an attack in progress. Uncover how meet these needs with an active forensic system that provides better visibility and intelligence.
Posted: 22 Jun 2012 | Published: 22 Jun 2012

CounterTack
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement