IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Host Intrusion Prevention

RSS Feed    Add to Google    Add to My Yahoo!
Host Intrusion PreventionWhite Papers (View All Report Types)
 
Manage Data Security and Application Threats with a Multi-Tiered Approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Network IPS Tested Against Latest Vulnerabilities and Attacks
sponsored by IBM
WHITE PAPER: This white paper serves as a guide to help you choose your intrusion prevention system (IPS) investment. Click through for information on a solution that passed essential test factors.
Posted: 20 Feb 2014 | Published: 18 Dec 2013

IBM

Detecting and Preventing Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

Exposing the Cybersecurity Cracks: A Global Perspective
sponsored by Websense, Inc.
WHITE PAPER: This eye-opening reviews data collected from nearly 5000 experienced IT workers regarding deficiencies in the ways that their companies attempt to think about, fight, and detect security breaches.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Websense, Inc.

Making a Business Case for Fraud Prevention Technology
sponsored by IBM
WHITE PAPER: This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

IBM

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

Securing Virtual Compute Infrastructure in the Cloud
sponsored by SAVVIS
WHITE PAPER: Server virtualization is one of the hottest topics in IT today. Initially driven by the need to consolidate servers to achieve higher hardware utilization rates, boost operational efficiency, and reduce costs, enterprises have recently implemented virtualization to obtain on-demand access to additional compute resources.
Posted: 02 Feb 2011 | Published: 02 Feb 2011

SAVVIS

Magic Quadrant for Mobile Data Protection
sponsored by Sophos, Inc.
WHITE PAPER: This Magic Quadrant is a snapshot of the overall market that ranks vendors against each other, according to competitive criteria. Vendors in any quadrant, as well as those not ranked on the Magic Quadrant, may be appropriate for your enterprise's needs and budget.
Posted: 14 Apr 2011 | Published: 13 Apr 2011

Sophos, Inc.

Solutions to Meet your PCI Compliance Needs
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn more about the capabilities of seven HP products in achieving Payment Card Industry (PCI) Data Security Standard (DSS) compliance. Ensure that compliance isn't a business inhibitor for your organization by consulting this informative resource.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Hewlett-Packard Company

NSS Labs - Breach Detection System Product Analysis
sponsored by Fortinet, Inc.
WHITE PAPER: This informative whitepaper discusses the effectiveness of one top-tier breach detection platform and how it can improve your security strategy.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement