IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Network Intrusion Detection

RSS Feed    Add to Google    Add to My Yahoo!
Network Intrusion Detection White Papers (View All Report Types)
 
Preventing Data Breaches in Privileged Accounts Using Access Control
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper explores insider attacks, threats and risks involved across every enterprise. Also, we will recommend a sound, cost-saving solution to prevent a disaster from happening to a company's financial assets and reputation using access control.
Posted: 21 Aug 2009 | Published: 21 Aug 2009

BeyondTrust Corporation

McAfee Tackles the Complexities of Endpoint Security
sponsored by McAfee, Inc.
WHITE PAPER: This white paper presents the myriad of enterprise endpoint threats today, and how you can conquer these difficult complexities.
Posted: 04 Jun 2013 | Published: 29 Mar 2013

McAfee, Inc.

Security for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett-Packard Company

How To Secure Electronic Healthcare Records Effectively
sponsored by HP & Intel®
WHITE PAPER: This white paper highlights important ways to prevent intrusion and block attacks with a security approach that’s comprehensive, automated, and proactive. That way, your organization can ease the worry of facing hefty financial penalties in the face of a data breach.
Posted: 19 Jun 2012 | Published: 19 Jun 2012

HP & Intel®

Selecting the right DLP solution: Enterprise, Lite, or Channel?
sponsored by Websense, Inc.
WHITE PAPER: DLP describes a wide range of solutions from simple tools that identify file types to enterprise-level products that make intelligent decisions based on network traffic. View now to discover which solution is best for your organization by exploring different type of DLP solutions, capabilities to consider, pros and cons of DLP types and more.
Posted: 06 Oct 2011 | Published: 06 Oct 2011

Websense, Inc.

Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: This series of technical briefs examines the key factors you need to consider regarding unified threat management (UTM) solutions as they impact security, performance, management, and consolidation.
Posted: 05 Dec 2007 | Published: 01 Dec 2007

SonicWALL

NSS Labs - Breach Detection System Product Analysis
sponsored by Fortinet, Inc.
WHITE PAPER: This informative whitepaper discusses the effectiveness of one top-tier breach detection platform and how it can improve your security strategy.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Fortinet, Inc.

Best Practices for Securing Your Wireless LAN
sponsored by AirMagnet
WHITE PAPER: This paper details real-world best practices needed to deploy and maintain a secure wireless network. Download this paper and learn how to effectively secure your wireless LAN by monitoring for a broad set of wireless attacks and intrusion techniques.
Posted: 14 Jun 2007 | Published: 14 Jun 2007

AirMagnet

Adaptive Security for the Health/Pharma Vertical
sponsored by Juniper Networks, Inc.
WHITE PAPER: Healthcare and pharmaceutical organizations are more sophisticated than ever before; but with that sophistication, they also face new challenges.
Posted: 13 Apr 2011 | Published: 13 Apr 2011

Juniper Networks, Inc.

The Cybercrime Arms Race
sponsored by Kaspersky Lab
WHITE PAPER: Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Kaspersky Lab
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement