IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Host Intrusion Detection

RSS Feed    Add to Google    Add to My Yahoo!
Host Intrusion Detection White Papers (View All Report Types)
 
An Inside Glance at the Power Behind Converged Campus Networks
sponsored by Hewlett-Packard Limited
WHITE PAPER: View this report for a complete analysis of enterprise campus networking solutions from Aruba Networks, Cisco, HP and Ruckus Wireless.
Posted: 12 Mar 2015 | Published: 28 Feb 2015

Hewlett-Packard Limited

Fifty Critical Alerts for Monitoring Windows Servers - Best Practices
sponsored by Prism Microsystems Inc.
WHITE PAPER: This document identifies and describes the most important events generated by your Windows servers so they can be addressed and corrected by IT personnel in the most efficient manner.
Posted: 08 Sep 2008 | Published: 05 Sep 2008

Prism Microsystems Inc.

Intrusion Detection and Prevention Learning Guide
sponsored by SearchSecurity.com
WHITE PAPER: This guide is a compilation of resources that explain what intrusion detection and prevention are, how they work, troubleshooting, configurations and more. Download the key to protecting your network.
Posted: 17 May 2007 | Published: 03 Oct 2005

SearchSecurity.com

Unified Threat Management: The Best Defense against Blended Threats
sponsored by SonicWALL
WHITE PAPER: The SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
Posted: 28 Apr 2008 | Published: 01 Jan 2005

SonicWALL

Practitioner's Guide to Establishing a SOC
sponsored by AlienVault
WHITE PAPER: This whitepaper provides an overview of how to evaluate the security controls needed to establish a Security Operation Center (SOC), along with what data a SOC needs to quickly detect and respond to a breach.
Posted: 12 Jul 2013 | Published: 09 Apr 2013

AlienVault

Enterprise-Grade Wireless LAN Security
sponsored by Siemens
WHITE PAPER: This white paper outlines the considerations that should be taken into account to ensure a successful enterprise-wide deployment of a secure wireless network.
Posted: 14 Nov 2006 | Published: 01 Sep 2005

Siemens

Detecting and Preventing Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: Continue on to this important whitepaper now to learn how to properly instrument and monitor for anomalous activity. Also discover a security intelligence platform that can directly monitor endpoints and much more.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

Adaptive Security for the Health/Pharma Vertical
sponsored by Juniper Networks, Inc.
WHITE PAPER: Healthcare and pharmaceutical organizations are more sophisticated than ever before; but with that sophistication, they also face new challenges.
Posted: 13 Apr 2011 | Published: 13 Apr 2011

Juniper Networks, Inc.

Simplifying Network Security with a Single Source Provider
sponsored by Perimeter eSecurity
WHITE PAPER: Read this whitepaper for a look at how, if done properly, reducing the number of security vendors or only selecting one vendor for multiple services is a great way for organizations to manage costs, obtain needed expertise, and expand security services.
Posted: 04 Dec 2008 | Published: 04 Dec 2008

Perimeter eSecurity

Potentially Unwanted Programs: Spyware and Adware
sponsored by McAfee, Inc.
WHITE PAPER: Potentially unwanted programs (PUPs) like adware and malware can compromise your computer network's privacy and security and the associated risks can weaken your entire network. Read this white paper to learn how to effectively protect against PUPs.
Posted: 27 Mar 2007 | Published: 01 Oct 2005

McAfee, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement