IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Network IDS

RSS Feed    Add to Google    Add to My Yahoo!
Network IDSWhite Papers (View All Report Types)
 
The Rising Threat of Corporate Cybercrime: Cybercriminal Motives and Methods
sponsored by Trusteer
WHITE PAPER: In this white paper, uncover the major cybercriminal attack methods and motives, and learn what modern cybercrime means for endpoint security. Read on to discover the growing need for effective antimalware today and more.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

Trusteer

Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

LogRhythm, Inc.

Unified Threat Management Market Review: WatchGuard vs. Juniper, Cisco, Fortinet, and SonicWall
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Compare the major brands of security products by UTM throughput per MSRP dollar to see where you will get the best value for your money. Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming.
Posted: 01 Jun 2010 | Published: 01 Apr 2010

WatchGuard Technologies, Inc.

Security Appliances: New Strides in Preventing Intrusions
sponsored by IBM
WHITE PAPER: According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

Potentially Unwanted Programs: Spyware and Adware
sponsored by McAfee, Inc.
WHITE PAPER: Potentially unwanted programs (PUPs) like adware and malware can compromise your computer network's privacy and security and the associated risks can weaken your entire network. Read this white paper to learn how to effectively protect against PUPs.
Posted: 27 Mar 2007 | Published: 01 Oct 2005

McAfee, Inc.

Granular application control, intelligence and real-time visualization
sponsored by SonicWALL
WHITE PAPER: Application intelligence and control is available along with SonicWALL Gateway Anti-Virus, Anti-Spyware and Intrusion Prevention as a one, two or three year subscription, or is included in SonicWALL Comprehensive Gateway Security Suite subscriptions for the TZ 210, Network Security Appliance (NSA) and E-Class NSA Series firewalls.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

SonicWALL

Fifty Critical Alerts for Monitoring Windows Servers - Best Practices
sponsored by Prism Microsystems Inc.
WHITE PAPER: This document identifies and describes the most important events generated by your Windows servers so they can be addressed and corrected by IT personnel in the most efficient manner.
Posted: 08 Sep 2008 | Published: 05 Sep 2008

Prism Microsystems Inc.

A Hidden Security Danger: Network Timing
sponsored by Symmetricom
WHITE PAPER: Most anyone who uses a PC no doubt sees the little clock at the bottom of the screen,dutifully ticking off the minutes of the passing day. But chances are they don’t often think about the role that clock plays in the network to which the PC is attached.
Posted: 27 Dec 2010 | Published: 27 Dec 2010

Symmetricom

2012 Endpoint Security Best Practices Survey Results
sponsored by Symantec Corporation
WHITE PAPER: This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
Posted: 08 Apr 2013 | Published: 08 Apr 2013

Symantec Corporation

Selecting the right DLP solution: Enterprise, Lite, or Channel?
sponsored by Websense, Inc.
WHITE PAPER: DLP describes a wide range of solutions from simple tools that identify file types to enterprise-level products that make intelligent decisions based on network traffic. View now to discover which solution is best for your organization by exploring different type of DLP solutions, capabilities to consider, pros and cons of DLP types and more.
Posted: 06 Oct 2011 | Published: 06 Oct 2011

Websense, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement