IT Systems  >   Business Systems  >   Security Systems  >  

Intrusion Detection Systems

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: ID Systems, Intruder Detection System, IDS
DEFINITION: Systems designed to detect illegal entrance to a computer system.
Intrusion Detection SystemsWhite Papers (View All Report Types)
26 - 50 of 50 Matches Previous Page  |  Next Page
A Guide to Big Data Security Analytics and SIEM Strategies
sponsored by LogRhythm, Inc.
WHITE PAPER: Explore the current SIEM tools and capabilities today and uncover how new improvements in SIEM can help boost your defenses in today's threat-filled world.
Posted: 31 Jan 2013 | Published: 31 Dec 2012

LogRhythm, Inc.

Global Business Gets Continuous Worldwide Network Protection
sponsored by Dell SecureWorks
WHITE PAPER: In this case study, find out how one organization's investments in an intrusion detection system (IDS) and continuous firewall are providing them with comprehensive protection that doesn't negatively impact network performance – read on to learn more.
Posted: 04 Dec 2012 | Published: 31 May 2012

Dell SecureWorks

Applying Security Holistically from the Cloud
sponsored by CloudAccess
WHITE PAPER: Consult this informative white paper to learn how the paradigm has shifted to security that's developed, deployed and managed from the cloud. Learn how to implement a holistic security strategy to protect all data in the enterprise.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

CloudAccess

HP TippingPoint: Next Generation Intrusion Prevention System
sponsored by Hewlett-Packard Company
WHITE PAPER: Consult this informative white paper to learn more about how intrusion prevention systems can improve the security in your business. With this security solution you can stop advanced and targeted attacks before they damage your company.
Posted: 27 Aug 2012 | Published: 27 Aug 2012

Hewlett-Packard Company

Solutions to Meet your PCI Compliance Needs
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn more about the capabilities of seven HP products in achieving Payment Card Industry (PCI) Data Security Standard (DSS) compliance. Ensure that compliance isn't a business inhibitor for your organization by consulting this informative resource.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Hewlett-Packard Company

Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations
sponsored by Websense, Inc.
WHITE PAPER: Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

Websense, Inc.

The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER: This paper analyzes the relationship between SIEM and log management - focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

Novell, Inc.

How Does Virtualization Change Your Approach to Enterprise Security?
sponsored by GlassHouse Technologies, Inc.
WHITE PAPER: As with any new technology, in order to achieve a secure implementation, it is necessary to augment existing policies and practices with an understanding of how virtualization works. Read this paper to find out more.
Posted: 17 Jun 2010 | Published: 17 Jun 2010

GlassHouse Technologies, Inc.

Battling Modern Botnets
sponsored by FireEye
WHITE PAPER: The FBI ranks cybercrime among its top priorities in part because botnets are proliferating at an alarming rate, crossing corporate boundaries and spreading infections behind corporate firewalls. Learn how FireEye provides advance detection and a blended approach to today’s botnet problem that "traditional" solutions do not.
Posted: 01 Sep 2009 | Published: 28 Apr 2008

FireEye

Real World Intrusion Prevention (IPS) for the Demands of a New Security Reality
sponsored by TippingPoint
WHITE PAPER: This whitepaper addresses primary areas that organizations must consider when evaluating possible solutions for intrusion prevention. Topics include: key network security challenged facing enterprises today; criteria for an effective IPS solution; And insights gained from enterprises already deploying IPS solutions in the real world.
Posted: 26 Aug 2009 | Published: 25 Aug 2009

TippingPoint

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
Posted: 26 Mar 2009 | Published: 01 Apr 2008

Symantec Corporation

Protection on demand: information security that works for you - instead of putting you to work.
sponsored by IBM
WHITE PAPER: Check out this white paper to learn more about the new approach to information security, protection on demand, which simplifies security and produces cost savings.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

Modern Malware Threats and Countermeasures
sponsored by Sunbelt Software
WHITE PAPER: Many of the early mass-infection events were highly publicized and very obvious events to the user, modern malware is usually designed to be much more subtle in its behaviors. learn about the newest methods and practices hackers are using.
Posted: 17 Nov 2008 | Published: 12 Nov 2008

Sunbelt Software

Expert eBook: Encryption: Properly Securing Your Valuable Data
sponsored by Information Security Magazine
WHITE PAPER: Check out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.
Posted: 28 Oct 2008 | Published: 28 Oct 2008

Information Security Magazine

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

Malware: Just What You Need to Know
sponsored by Sunbelt Software
WHITE PAPER: There are ten things you can start doing today to boost your malware protection and take things to the next level. This paper provides insights and tips regarding malware and how to protect your networks from it.
Posted: 07 Oct 2008 | Published: 07 Oct 2008

Sunbelt Software

Stopping Crimeware In Its Tracks
sponsored by FireEye
WHITE PAPER: This paper describes the damaging cybercrime threat posed by botnets, explains why traditional security solutions cannot stop them, and proposes a new approach that can eradicate cybercrime from corporate networks.
Posted: 29 Sep 2008 | Published: 01 Sep 2008

FireEye

Cyber Attacks on the Rise: IBM 2007 Report
sponsored by IBM
WHITE PAPER: This white paper shows how the IBM Internet Security Systems™ X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.
Posted: 19 Nov 2007 | Published: 01 Aug 2007

IBM

Examining SSL-encrypted Communications
sponsored by Netronome Systems
WHITE PAPER: SSL-encrypted communications have enabled a variety of secure, web-based communications and online transactions. This paper explores the drivers behind the increase in SSL usage and the methods used to confront the security challenges that SSL creates.
Posted: 26 Oct 2007 | Published: 16 Oct 2007

Netronome Systems

Selecting the Right Host Intrusion Prevention System: 12 Key Questions to Ask
sponsored by Third Brigade
WHITE PAPER: This white paper identifies 12 critical questions that organizations need to consider when selecting a HIPS product. These questions relate to protection, manageability, integration and speed.
Posted: 18 Jun 2007 | Published: 15 May 2007

Third Brigade

Integrating Mobile Access into Your VPN Environment
sponsored by AT&T Corp
WHITE PAPER: Enterprises are increasingly facing the task of integrating a variety of access services and devices onto their Virtual Private Networks (VPN). This white paper takes a closer look at some key issues that arise when bringing access methods into your VPN.
Posted: 31 May 2007 | Published: 07 Jun 2006

AT&T Corp

Intrusion Detection and Prevention Learning Guide
sponsored by SearchSecurity.com
WHITE PAPER: This guide is a compilation of resources that explain what intrusion detection and prevention are, how they work, troubleshooting, configurations and more. Download the key to protecting your network.
Posted: 17 May 2007 | Published: 03 Oct 2005

SearchSecurity.com

Automated Penetration Testing; Can IT Afford Not To?
sponsored by Core Security Technologies
WHITE PAPER: This paper contains an overview of penetration testing, a summary of vulnerabilities that can be revealed through penetration testing, and the business and technical benefits of performing penetration testing across your infrastructure.
Posted: 18 Jan 2007 | Published: 01 Jan 2007

Core Security Technologies

On-Demand Security Audit and Vulnerability Management - A Proactive Approach to Network Security
sponsored by Qualys, Inc.
WHITE PAPER: This paper explores the various approaches to network security and focuses on the unique role of vulnerability management and automated security audits. Learn about the four pillars of security and different approaches to vulnerability management.
Posted: 07 Nov 2006 | Published: 01 Sep 2006

Qualys, Inc.

Multiple Lines of Defense
sponsored by ENDFORCE, Inc
WHITE PAPER: No single countermeasure can protect your network from every conceivable threat, this white paper examines how to effectively mitigate risk by implementing an integrated multilayered security system for controlling endpoint attacks.
Posted: 05 Apr 2006 | Published: 31 Dec 2005

ENDFORCE, Inc
26 - 50 of 50 Matches Previous Page    1 2    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement