IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Detection Systems  >  

Host-Based Intrusion Detection Systems (HIDS)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet.
Host-Based Intrusion Detection Systems (HIDS) Reports
151 - 175 of 1176 Matches Previous Page  |  Next Page
BIMODAL IT: The Path to Agility
sponsored by Red Hat
RESOURCE: In the following informative infographic, learn how a bimodal approach to IT can enable far greater IT agility at a manageable cost.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

Red Hat

Build a Reliable, Accurate CMDB by Addressing Data Quality
sponsored by BDNA
WHITE PAPER: Discover the top data quality issues derailing your configuration management database (CMDB) initiatives. Learn how you can build and maintain an accurate, reliable CMDB by taking the steps to address poor data quality.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

BDNA

Build Security into Your Data Center's DNA with Micro-Segmentation
sponsored by VMware, Inc.
WHITE PAPER: This white paper introduces a new method of data center security that's based on integrating security controls with the hypervisors.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

VMware, Inc.

Building a More Efficient Data Centre for Your Most Demanding Workloads With HPE BladeSystem
sponsored by HPE and Intel®
WHITE PAPER: This white paper presents readers with four common workload challenges and dives deep into the systems and strategies to overcome them. View now and see how you can make your data centre and IT environment as a whole more agile, flexible, and cost effective.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

HPE and Intel®

Building Engaging Content Experiences: A CIO Webinar
sponsored by Box
WEBCAST: Discover in this webinar how to build engaging content experiences in your custom apps, as Mike Schwartz, Platform Product Marketing at Box, will help you reimagine your enterprise content sharing. Tune in now to learn about content PaaS, and boost user experience engagement while overcoming compliance obstacles.
Posted: 25 Apr 2016 | Premiered: Apr 25, 2016

Box

Big Data Security Analytics: Harnessing New Tools for Better Security
sponsored by Hexis Cyber Solutions Inc
EBOOK: New techniques are emerging to help organizations analyze security data and improve security defenses.
Posted: 18 Jun 2013 | Published: 18 Jun 2013

Hexis Cyber Solutions Inc

BlueLock Underpins its Cloud Computing Hosting Services with Best-in-Class Security
sponsored by IBM
CASE STUDY: Read this case study to learn how a dynamic, virtualized security solution built around IBM Internet Security Systems helped BlueLock bolster security efforts with a more versatile solution, shorten the deployment cycle for new customers, and reduce hardware costs and energy use.
Posted: 24 Sep 2010 | Published: 01 Oct 2009

IBM

Boost IT Visibility & Value with Service Catalog
sponsored by ServiceNow
WHITE PAPER: Find out how creating a great service catalog can help prove the value of IT, and why many consider it fundamental.
Posted: 19 May 2014 | Published: 30 Apr 2013

ServiceNow

Breach Prevention Industry Best Practices & Standards Data Sheet: Industry Perspectives – Healthcare
sponsored by Symantec Corporation
WHITE PAPER: This informative paper examines how you can build a formidable breach prevention strategy designed specifically for healthcare.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Symantec Corporation

Bringing the Network Perimeter Back From the 'Dead'
sponsored by Symantec Corporation
EGUIDE: There's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012

Symplified

Building a Better Network Security Strategy
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise

Building an Extranet Portal
sponsored by Juniper Networks, Inc.
WHITE PAPER: The need for organizations to provide network access for external audiences such as partners & customers is increasing. This paper details the benefits of an extranet portal & highlights SSL VPN technology as a best approach to achieve increase...
Posted: 27 Oct 2006 | Published: 01 Sep 2006

Juniper Networks, Inc.

Building An Intelligence - Driven Security Operations Center
sponsored by EMC Corporation
WHITE PAPER: Access this white paper for insider tips on rapid cyber threat detection and remediation as well as how to coordinate technologies, personnel, and processes for better security.
Posted: 26 Sep 2013 | Published: 28 Feb 2013

EMC Corporation

Building Capabilities Leveraging Alternate Solution Deployments
sponsored by SAP America, Inc.
WHITE PAPER: This white paper explores the delivery methods and strategies for achieving versatile, agile and powerful IT capabilities. Inside, learn about the need for service and application orchestration, as well as cutting edge strategies for meeting a new generation of business needs.
Posted: 30 Jun 2011 | Published: 30 Jun 2011

SAP America, Inc.

Business Intelligence in SAP Environments
sponsored by IBM
WHITE PAPER: This paper discusses the disruptions to SAP’s roadmap after the acquisition of BOBJ, and discusses various scenarios in which customers might decide to stay with SAP BOBJ for its BI strategy, and also when it might be best to use a third-party BI platform to leverage their SAP investments. Read this paper to learn more.
Posted: 22 Jun 2010 | Published: 26 May 2010

IBM

Business Intelligence on a Budget: Is Software as a Service Business Intelligence right for your organization?
sponsored by Indicee
WHITE PAPER: With no upfront cost and minimal effort required for set up, SaaS BI solutions are ideal for small to mid-sized businesses, for addressing specific business needs or when few IT resources are available. SaaS BI solutions quickly provide access to critical reporting and analysis without the time needed for a full-blown on-premise BI implementation.
Posted: 05 Apr 2010 | Published: 05 Apr 2010

Indicee

Business Intelligence: The Definitive Guide for Midsize Organizations
sponsored by SAP America, Inc.
WHITE PAPER: Business intelligence (BI) allows organizations to better understand, analyze, and even predict what's occurring in their company.
Posted: 09 Jun 2008 | Published: 01 Jun 2008

SAP America, Inc.

Business Rules and Gap Analysis: Discovery and Management of Business Rules Avoids Business Disruptions
sponsored by Micro Focus, Ltd
WHITE PAPER: This paper will assess how to locate and account for functionality gaps. It will also illustrate a methodology for realigning applications with business goals.
Posted: 04 Dec 2009 | Published: 23 Nov 2009

Micro Focus, Ltd

Business Strategy for Cloud Providers: The Case for Potential Cloud Services Providers
sponsored by IBM
WHITE PAPER: This paper is focused on helping those who want to emerge aswinners in the new cloud provider marketplace. Read on to learn tips for creating a winning cloud provider business strategy and model.
Posted: 21 Sep 2010 | Published: 29 Sep 2009

IBM

Business Transformation Through Telepresence
sponsored by AT&T Corp
WHITE PAPER: Check out this research brief as it explores key findings to maximize business telepresence value by understanding how telepresence works as an enabler for business transformation. Learn how best-in-class organizations deploy telepresence to gain business value and see benefits that drive top-line growth.
Posted: 16 Jun 2011 | Published: 16 Jun 2011

AT&T Corp

Business Transformation: Exploring the Requirements of a Strategic Business Transformation
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: To keep up with market demands and trends, it is important for organizations to transform their business. This guide explores business transformation and how it reduces risk and cost
Posted: 19 Nov 2013 | Published: 19 Nov 2013

Hewlett-Packard Enterprise

Business Value of Sterling Commerce Managed Services for B2B Integration
sponsored by Sterling Commerce, An IBM Company
WHITE PAPER: Increasing cost controls and unpredictable cost increases are leading many enterprises to rethink how they support their business-to-business (B2B) operations. As a result, many enterprises are choosing to outsource B2B integration by partnering with a managed services provider.
Posted: 11 Sep 2009 | Published: 01 Sep 2009

Sterling Commerce, An IBM Company

Buyer's Criteria for Advanced Malware Protection
sponsored by Sourcefire
WHITE PAPER: This guide explores the current state of malware in today's threat landscape and discusses some of the top strategies for stopping sophisticated malware.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Sourcefire

Buyer's Criteria for Next-Generation Network Security
sponsored by Sourcefire
WHITE PAPER: This whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire
151 - 175 of 1176 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement