IT Systems  >   Business Systems  >   Security Systems  >  

Intruder Detection System

RSS Feed    Add to Google    Add to My Yahoo!
Intruder Detection System White Papers (View All Report Types)
 
University of Wisconsin-Superior Secures Their Campus Network with AlienVault® USMTM
sponsored by AlienVault
WHITE PAPER: University of Wisconsin–Superior's IT team was looking to replace their outdated intrusion prevention system. In this case study, discover how they were able to overcome budget challenges in order to find a solution that still met the security needs of their large network.
Posted: 19 Aug 2016 | Published: 01 Jul 2017

AlienVault

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
Posted: 26 Mar 2009 | Published: 01 Apr 2008

Symantec Corporation

Integrating Mobile Access into Your VPN Environment
sponsored by AT&T Corp
WHITE PAPER: Enterprises are increasingly facing the task of integrating a variety of access services and devices onto their Virtual Private Networks (VPN). This white paper takes a closer look at some key issues that arise when bringing access methods into your VPN.
Posted: 31 May 2007 | Published: 07 Jun 2006

AT&T Corp

Total Economic Impact of IBM Security Network Protection (XGS), Forrester Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This white paper examines the benefits you will realize by deploying next generation intrusion prevention. Access now to discover how next-gen IPS could impact your organization.
Posted: 27 Apr 2016 | Published: 01 Feb 2016

IBM

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

Selecting the Right Host Intrusion Prevention System: 12 Key Questions to Ask
sponsored by Third Brigade
WHITE PAPER: This white paper identifies 12 critical questions that organizations need to consider when selecting a HIPS product. These questions relate to protection, manageability, integration and speed.
Posted: 18 Jun 2007 | Published: 15 May 2007

Third Brigade

Malware: Just What You Need to Know
sponsored by Sunbelt Software
WHITE PAPER: There are ten things you can start doing today to boost your malware protection and take things to the next level. This paper provides insights and tips regarding malware and how to protect your networks from it.
Posted: 07 Oct 2008 | Published: 07 Oct 2008

Sunbelt Software

Solutions to Meet your PCI Compliance Needs
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn more about the capabilities of seven HP products in achieving Payment Card Industry (PCI) Data Security Standard (DSS) compliance. Ensure that compliance isn't a business inhibitor for your organization by consulting this informative resource.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Hewlett Packard Enterprise

12 Things Effective Intrusion Prevention Systems Should Do
sponsored by DellEMC and Intel®
WHITE PAPER: Uncover the top 12 features and functions that your intrusion prevention system (IPS) needs in order to defend against today's stealthy threats. Read on now to see if your organization is at risk.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

DellEMC and Intel®

Protection on demand: information security that works for you - instead of putting you to work.
sponsored by IBM
WHITE PAPER: Check out this white paper to learn more about the new approach to information security, protection on demand, which simplifies security and produces cost savings.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement