IT Systems  >   Business Systems  >   Security Systems  >  

Intruder Detection System

RSS Feed    Add to Google    Add to My Yahoo!
Intruder Detection System White Papers (View All Report Types)
Today's Top Intrusion Prevention Systems
sponsored by IBM
WHITE PAPER: This Magic Quadrant presents the strengths and weaknesses of today's top next-generation intrusion prevention system (NGIPS) vendors and outlines what capabilities your security strategy needs. View now to learn how to evaluate NGIPS vendors and platforms.
Posted: 18 Feb 2016 | Published: 16 Nov 2015


Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

LogRhythm, Inc.

Strategies for Protection: Malware-Based Attacks and APTs
sponsored by F5 Networks
WHITE PAPER: This guide looks at top tools and strategies for fighting APTs and malware-based attacks.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

F5 Networks

Importance of User Behavior Analytics for Cloud Service Security
sponsored by Palerra Inc.
WHITE PAPER: Traditional security solutions can't keep up with the growing sophistication of today's attacks. To combat modern threats, many organizations are turning to user behavior analytics (UBA) to focus on finding vulnerabilities quickly. View this white paper to examine the effectiveness of UBA and decide if it can benefit your defense strategy.
Posted: 19 Jan 2016 | Published: 04 Dec 2015

Palerra Inc.

The Perils of Phishing: How Cybercriminals Are Targeting Your Weakest Link
sponsored by IBM
WHITE PAPER: In the fight against phishing, your employees may be your weakest link—what can you do to ensure that they're not accidentally enticed by hackers? This white paper provides you with essential information on how phishing attacks occur and how you can mitigate these threats.
Posted: 11 Sep 2015 | Published: 31 May 2015


Magic Quadrant for Intrusion Prevention Systems
sponsored by IBM
WHITE PAPER: View this white paper to gain a key understanding on stand-alone IPS products and capabilities. It outlines the strengths and weaknesses of various vendors and what you should look for when you're searching for an IPS.
Posted: 19 Apr 2013 | Published: 05 Jul 2012


Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos, Inc.
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Sophos, Inc.

Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER: This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013


Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013


Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement