IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Prevention

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Intrusion Prevention, Host Intrusion Prevention, Intrusion Protection, Network Intrusion Management
DEFINITION: Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses numbers raised to specific powers to produce decryption keys on the basis of components that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming. To implement Diffie-Hellman, the two end users Alice and Bob, while communicating over a channel  … 
Definition continues below.
Intrusion Prevention White Papers (View All Report Types)
26 - 50 of 107 Matches Previous Page  |  Next Page
Practitioner's Guide to Establishing an SOC
sponsored by AlienVault
WHITE PAPER: This white paper provides an overview of how to evaluate the security controls needed to establish a Security Operation Center (SOC), along with what data a SOC needs to quickly detect and respond to a breach.
Posted: 12 Jul 2013 | Published: 09 Apr 2013

AlienVault

Magic Quadrant for Intrusion Prevention Systems
sponsored by IBM
WHITE PAPER: View this white paper to gain a key understanding on stand-alone IPS products and capabilities. It outlines the strengths and weaknesses of various vendors and what you should look for when you're searching for an IPS.
Posted: 19 Apr 2013 | Published: 05 Jul 2012

IBM

Endpoint Protection Platforms for Enterprises
sponsored by Symantec Corporation
WHITE PAPER: This guide explores a unique enterprise endpoint protection platform that encompasses a multitude of security tools.
Posted: 14 Feb 2014 | Published: 08 Jan 2014

Symantec Corporation

A Buyer's Guide to Endpoint Protection Platforms
sponsored by McAfee, Inc.
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

McAfee, Inc.

Is Your Platform Secure? Really?
sponsored by IBM
WHITE PAPER: This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

IBM

McAfee Tackles the Complexities of Endpoint Security
sponsored by McAfee, Inc.
WHITE PAPER: This white paper presents the myriad of enterprise endpoint threats today, and how you can conquer these difficult complexities.
Posted: 04 Jun 2013 | Published: 29 Mar 2013

McAfee, Inc.

2012 Endpoint Security Best Practices Survey Results
sponsored by Symantec Corporation
WHITE PAPER: This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
Posted: 08 Apr 2013 | Published: 08 Apr 2013

Symantec Corporation

Fighting Rootkits: Protecting against stealthy malware by flying under the operating system
sponsored by Intel
WHITE PAPER: Discover why rootkits are so harmful to your organization and uncover the innovative and dramatically different approach you should take to protect your organization from these harmful intruders.
Posted: 27 Dec 2012 | Published: 31 Jan 2012

Intel

Intelligent Authentication and User Access: Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: This informative white paper outlines today's rapidly changing security landscape,  and offers an overview of the latest identity and access security strategies so that your organization can stay safe - click through to learn more.
Posted: 25 Oct 2012 | Published: 25 Oct 2012

CA Technologies.

Applying Security Holistically from the Cloud
sponsored by CloudAccess
WHITE PAPER: Consult this informative white paper to learn how the paradigm has shifted to security that's developed, deployed and managed from the cloud. Learn how to implement a holistic security strategy to protect all data in the enterprise.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

CloudAccess

HP TippingPoint: Next Generation Intrusion Prevention System
sponsored by Hewlett-Packard Company
WHITE PAPER: Consult this informative white paper to learn more about how intrusion prevention systems can improve the security in your business. With this security solution you can stop advanced and targeted attacks before they damage your company.
Posted: 27 Aug 2012 | Published: 27 Aug 2012

Hewlett-Packard Company

Solutions to Meet your PCI Compliance Needs
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn more about the capabilities of seven HP products in achieving Payment Card Industry (PCI) Data Security Standard (DSS) compliance. Ensure that compliance isn't a business inhibitor for your organization by consulting this informative resource.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Hewlett-Packard Company

How To Secure Electronic Healthcare Records Effectively
sponsored by HP & Intel®
WHITE PAPER: This white paper highlights important ways to prevent intrusion and block attacks with a security approach that’s comprehensive, automated, and proactive. That way, your organization can ease the worry of facing hefty financial penalties in the face of a data breach.
Posted: 19 Jun 2012 | Published: 19 Jun 2012

HP & Intel®

The Next Generation IPS
sponsored by HP Enterprise Security
WHITE PAPER: Today’s organizations are faced with the growing challenge of advanced persistent threats (APTs). These attacks are more sophisticated and stealthier, using a variety of techniques to probe and gain access to high-value information. In this paper, uncover how to defend against APTs using a new innovative approach, Next Generation IPS.
Posted: 07 May 2012 | Published: 04 May 2012

HP Enterprise Security

Getting Ahead of Advanced Threats - Achieving Intelligence-Driven Security
sponsored by RSA
WHITE PAPER: With today’s advancing threat landscape, traditional approaches to information security are no longer enough. Instead organizations need to take an intelligence-driven approach to more effectively detect and mitigate cyber attacks. View now to explore the growing need for intelligence-driven security and uncover a 6-step approach for achieving it.
Posted: 07 Mar 2012 | Published: 07 Mar 2012

RSA

How to Effectively Secure Electronic Health Records
sponsored by HP and Intel®
WHITE PAPER: In the ongoing effort to reach HIPPA Electronic Medical Record (EMR) compliance standards, one of the biggest concerns is security. Download this whitepaper to see how to develop a blanket of security for patients and your reputation through leveraging best practices for automated threat protection!
Posted: 29 Feb 2012 | Published: 29 Feb 2012

HP and Intel®

Security considerations for small and medium-sized enterprises (SMEs)
sponsored by GFI Software
WHITE PAPER: SMEs are just as vulnerable to security breaches as any other enterprise, but often times they consider security only as an afterthought. View this paper to explore key security challenges for SMEs and the necessary tools and policies for effective protection.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

GFI Software

Protecting the Network Perimeter: Controlling what gets through—into and out of your organization
sponsored by McAfee.
WHITE PAPER: The traffic allowed to flow through the network perimeter – both good and bad – can determine the success or potential downfall of an organisation. View this paper to explore how McAfee can help protect network perimeters with a solution that enables organisations to easily, effectively, and securely manage traffic flow.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

McAfee.

McAfee Leads Criteria for Next-Generation IPS
sponsored by McAfee.
WHITE PAPER: Discover how to mitigate today's increasingly sophisticated attacks with next-generation intrusion prevention (IPS). View now to explore how McAfee Network Security Platform 7 and an integrated network security framework can help deliver new levels of protection.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

McAfee.

A pragmatic approach to security - How to stay secure in 2012
sponsored by Dell SecureWorks
WHITE PAPER: While it can be tempting to simply buy new security technologies to solve your problems, they are unlikely to help if the basics of an effective security practice are not in place. In this white paper, discover how your organisation can apply pragmatism to IT security and do more with what you already have.
Posted: 18 Nov 2011 | Published: 18 Nov 2011

Dell SecureWorks

Technical Overview of McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention
sponsored by McAfee, Inc.
WHITE PAPER: While databases are the warehouses of the most valuable information assets in the enterprise, many organizations today do poorly to protect them. In this paper, discover how to protect your database and data assets with McAfee Database Security Solution, a multi-tiered solution that can help defend against threats and eliminate vulnerabilities.  
Posted: 04 Nov 2011 | Published: 04 Nov 2011

McAfee, Inc.

Advanced Threats: The New World Order
sponsored by RSA
WHITE PAPER: This paper examines the state of advanced threats on the front lines, as seen by the companies, law enforcement officials and government leaders. View now to gain a better understanding of these emerging threats, its challenges to all organizations and how to defend against them.
Posted: 25 Oct 2011 | Published: 25 Oct 2011

RSA

Radware Security Incidents Report, 1H2011 Special Focus: Multi-Layer Attack Threats
sponsored by Radware
WHITE PAPER: This Security Incidents Report explores select cases of recent multi-layered attack threats. Read now to explore these “war stories” and gain key recommendations on how to address them.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Radware

Stopping Fake Antivirus: How to Keep Scareware off Your Network
sponsored by Sophos, Inc.
WHITE PAPER: This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.
Posted: 04 Oct 2011 | Published: 01 Sep 2011

Sophos, Inc.

FortiGate DoS Protection - Block Malicious Traffic Before It Affects Critical Applications and Systems
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization’s network from being used to attack another organization.
Posted: 01 Aug 2011 | Published: 29 Jul 2011

Fortinet, Inc.
26 - 50 of 107 Matches Previous Page    1 2 3 4 5    Next Page
 
INTRUSION PREVENTION DEFINITION (continued): …  they know to be private, mutually agree on positive whole numbers p and q, such that p is a prime number and q is a generator of p. The generator q is a number that, when raised to positive whole-number powers less than p, never produces the same result for any two such whole numbers. The value of p may be large but the value of q is usually small.Once Alice and Bob have agreed on p and q in private, they choose positive whole-number personal keys a and b, both less than the prime-number modulus p. Neither user divulges their personal key to anyone; ideally they memorize these numbers and do not … 
Intrusion Prevention definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement