IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Detection Systems  >  

Host-Based Intrusion Detection Systems (HIDS)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet.
Host-Based Intrusion Detection Systems (HIDS)Reports
151 - 175 of 1109 Matches Previous Page  | Next Page
Beyond the Next Generation: Meeting the Converging Demands of Network Security
sponsored by IBM
WHITE PAPER: Read this whitepaper to learn more about rising to the converging demands of network security. Topics covered include the evolution of network security, the development of "next-generation" approaches, use cases and more.
Posted: 04 Sep 2013 | Published: 30 Sep 2012

IBM

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 21 Aug 2013 | Published: 31 May 2013

IBM

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 20 Mar 2014 | Published: 31 May 2013

IBM

Breach Prevention Industry Best Practices & Standards Data Sheet: Industry Perspectives – Healthcare
sponsored by Symantec Corporation
WHITE PAPER: This informative paper examines how you can build a formidable breach prevention strategy designed specifically for healthcare.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Symantec Corporation

Build a network perimeter for the mobile age
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper examines how your organization can meet the challenges of securing and managing a modern network by embracing a perimeter model based on logical controls that consistently enforce enterprise policy wherever an asset is located.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Palo Alto Networks

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Hewlett-Packard Company

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Building out an IAM Infrastructure and Strategy while Supporting Compliance Needs
sponsored by IBM
EGUIDE: In this expert E-Guide, Forrester Research's Andras Cser discusses what the steps should be when building out an IAM infrastructure and strategy.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

IBM

Business Information University: Profiting From the New Capabilities of BI Platforms
sponsored by SearchBusinessAnalytics
VIRTUAL ENVIRONMENT: This virtual classroom offers insight on advances in business intelligence (BI) platforms and provides advice on how to make effective use of the new technologies. It examines some of the key aspects of building an architecture to meet the increased demands of your business.
Posted: 13 Mar 2013 | Premiered: 15 Mar 2013

SearchBusinessAnalytics

Business Transformation is needed for the New Style of IT
sponsored by Hewlett-Packard Limited
WEBCAST: In this on-demand video, learn how you can embrace a new style of IT by transforming your business and its processes with the right technology partner.
Posted: 11 Feb 2014 | Premiered: Nov 18, 2013

Hewlett-Packard Limited

Business Transformation: Exploring the Requirements of a Strategic Business Transformation
sponsored by Hewlett-Packard Limited
WHITE PAPER: To keep up with market demands and trends, it is important for organizations to transform their business. This guide explores business transformation and how it reduces risk and cost
Posted: 19 Nov 2013 | Published: 19 Nov 2013

Hewlett-Packard Limited

BI for Small and Mid-sized Businesses
sponsored by LogiXML
WHITE PAPER: This paper dispels some myths about BI in smaller companies and outlines the main options at your disposal.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

LogiXML

Big Data Security Analytics: Harnessing New Tools for Better Security
sponsored by Hexis Cyber Solutions Inc
EBOOK: New techniques are emerging to help organizations analyze security data and improve security defenses.
Posted: 18 Jun 2013 | Published: 18 Jun 2013

Hexis Cyber Solutions Inc

BlueLock Underpins its Cloud Computing Hosting Services with Best-in-Class Security
sponsored by IBM
CASE STUDY: Read this case study to learn how a dynamic, virtualized security solution built around IBM Internet Security Systems helped BlueLock bolster security efforts with a more versatile solution, shorten the deployment cycle for new customers, and reduce hardware costs and energy use.
Posted: 24 Sep 2010 | Published: 01 Oct 2009

IBM

Bringing the Network Perimeter Back From the 'Dead'
sponsored by Symantec Corporation
EGUIDE: There's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012

Symplified

Building an Extranet Portal
sponsored by Juniper Networks, Inc.
WHITE PAPER: The need for organizations to provide network access for external audiences such as partners & customers is increasing. This paper details the benefits of an extranet portal & highlights SSL VPN technology as a best approach to achieve increase...
Posted: 27 Oct 2006 | Published: 01 Sep 2006

Juniper Networks, Inc.

Building An Intelligence - Driven Security Operations Center
sponsored by EMC Corporation
WHITE PAPER: Access this white paper for insider tips on rapid cyber threat detection and remediation as well as how to coordinate technologies, personnel, and processes for better security.
Posted: 26 Sep 2013 | Published: 28 Feb 2013

EMC Corporation

Building Capabilities Leveraging Alternate Solution Deployments
sponsored by SAP America, Inc.
WHITE PAPER: This white paper explores the delivery methods and strategies for achieving versatile, agile and powerful IT capabilities. Inside, learn about the need for service and application orchestration, as well as cutting edge strategies for meeting a new generation of business needs.
Posted: 30 Jun 2011 | Published: 30 Jun 2011

SAP America, Inc.

Business Intelligence in SAP Environments
sponsored by IBM
WHITE PAPER: This paper discusses the disruptions to SAP’s roadmap after the acquisition of BOBJ, and discusses various scenarios in which customers might decide to stay with SAP BOBJ for its BI strategy, and also when it might be best to use a third-party BI platform to leverage their SAP investments. Read this paper to learn more.
Posted: 22 Jun 2010 | Published: 26 May 2010

IBM

Business Intelligence on a Budget: Is Software as a Service Business Intelligence right for your organization?
sponsored by Indicee
WHITE PAPER: With no upfront cost and minimal effort required for set up, SaaS BI solutions are ideal for small to mid-sized businesses, for addressing specific business needs or when few IT resources are available. SaaS BI solutions quickly provide access to critical reporting and analysis without the time needed for a full-blown on-premise BI implementation.
Posted: 05 Apr 2010 | Published: 05 Apr 2010

Indicee

Business Intelligence: The Definitive Guide for Midsize Organizations
sponsored by SAP America, Inc.
WHITE PAPER: Business intelligence (BI) allows organizations to better understand, analyze, and even predict what's occurring in their company.
Posted: 09 Jun 2008 | Published: 01 Jun 2008

SAP America, Inc.

Business Rules and Gap Analysis: Discovery and Management of Business Rules Avoids Business Disruptions
sponsored by Micro Focus, Ltd
WHITE PAPER: This paper will assess how to locate and account for functionality gaps. It will also illustrate a methodology for realigning applications with business goals.
Posted: 04 Dec 2009 | Published: 23 Nov 2009

Micro Focus, Ltd

Business Strategy for Cloud Providers: The Case for Potential Cloud Services Providers
sponsored by IBM
WHITE PAPER: This paper is focused on helping those who want to emerge aswinners in the new cloud provider marketplace. Read on to learn tips for creating a winning cloud provider business strategy and model.
Posted: 21 Sep 2010 | Published: 29 Sep 2009

IBM

Business Transformation Through Telepresence
sponsored by AT&T Corp
WHITE PAPER: Check out this research brief as it explores key findings to maximize business telepresence value by understanding how telepresence works as an enabler for business transformation. Learn how best-in-class organizations deploy telepresence to gain business value and see benefits that drive top-line growth.
Posted: 16 Jun 2011 | Published: 16 Jun 2011

AT&T Corp
151 - 175 of 1109 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement