IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Detection Systems  >  

Host-Based Intrusion Detection Systems (HIDS)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet.
Host-Based Intrusion Detection Systems (HIDS) Reports
176 - 200 of 1154 Matches Previous Page  |  Next Page
Can New Security Tools Keep Your Network Clean?
sponsored by SearchSecurity.com
EZINE: This issue provides network and security IT pros with step-by-step guidance so they can decide what advanced security monitoring tools are right for their network's particular needs.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

SearchSecurity.com

Case Study: Closing in on China's Unit 78020
sponsored by ThreatConnect
WHITE PAPER: This report explores how a Chinese cyber-espionage group known as Unit 78020 was discovered with an advanced intrusion analysis strategy.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

ThreatConnect

Case Study: How John Lewis Conquered the Web
sponsored by ComputerWeekly.com
BOOK: Bill Goodwin tells the inside story of John Lewis £40m website redevelopment project, assesses the technical and business challenges faced and its impact on the business.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

Case Study: Local Government Finds Cybersecurity that Meets its Budget
sponsored by AlienVault
WHITE PAPER: This white paper tells the story of how the IT managers for the City of Lewiston found a security solution that worked for them, keeping their network secure without incurring additional costs or requiring additional manpower.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

AlienVault

Case Study: Prefabricated Micro Data Center Approach Solves 133-Year-Old Design Challenge
sponsored by Schneider Electric
CASE STUDY: Tune into this brief video to discover how prefabricated data center modules support the construction and 24/7 business operations of the Sagrada Familia. Watch now to learn how their new IT infrastructure allows the church to respond to continuously changing business requirements with high reliability and flexibility.
Posted: 02 May 2016 | Published: 21 Oct 2015

Schneider Electric

Case Study: The World's First Cloud-enabled G20 Leaders' Summit
sponsored by Dimension Data
CASE STUDY: In this case study, you will learn how the G20 Leaders' Summit developed a fully consumptive, cloud-enabled network to deliver a seamless user experience—for BYOD, high speed data upload, and print-anywhere functionality.
Posted: 19 Apr 2016 | Published: 18 Apr 2016

Dimension Data

Case Study: World's First Cloud-Enabled G20 Leaders' Summit
sponsored by Dimension Data
CASE STUDY: This case study explores how the Australian Government delivered connectivity and a secure, seamless virtual desktop experience to the media and delegates at the G20 Leaders' Summit. Discover how the cloud played a major role in the success of this global event.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

Dimension Data

CEB IT Budget Benchmark 2015 to 2016
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Corporate IT budgets are expected to grow by just 2.0% in the coming year, with budgets for 'keeping the lights on' expected to surpass capital spending for the first time since 2009, this report from CEB reveals.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

ComputerWeekly.com

CIO and IT leadership survey
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: IT budgets are increasing and IT leaders have more influence at board level as organisations invest in agile, innovative projects, according to this survey by IT management consultant Coeus Consulting.
Posted: 08 Apr 2016 | Published: 08 Apr 2016

ComputerWeekly.com

CIO Trends Asean Q1 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide offers a collection of our most popular articles for IT leaders in Asean during the first few months of 2016, examining the changing role of CIOs and how to enhance their relationships with their peers across the business.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

ComputerWeekly.com

CIOs: 3 IT Imperatives to Transform the Enterprise
sponsored by ServiceNow
WHITE PAPER: This resource presents key insights from a recent CIO leadership forum in which senior IT leaders shared strategies for IT innovation. Learn the 3 imperatives that these leaders used to transform their enterprise.
Posted: 10 Mar 2016 | Published: 10 Mar 2016

ServiceNow

CA Technologies Strategy & Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource details a cloud-based identity and access management (IAM) solution designed to secure access to cloud-based services and apps, simplify IAM both on-premises and in the cloud, and improve efficiency. View now to learn more!
Posted: 19 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

CA Virtualization Management Solution Brief
sponsored by CA Technologies.
PRODUCT LITERATURE: CA Virtualization Management solutions provide integrated end-to-end management, business-driven automation and security. As such, CA facilitates virtualization's promise of cost reduction and efficiency gains through consolidation, standardization and lower energy consumption, which drive better business outcomes.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

CA Technologies.

Can a Federated Identity Service Strengthen SSO?
sponsored by Radiant Logic, Inc.
WHITE PAPER: With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure
Posted: 04 Jun 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Case Study - Anittel Simplifies Managed AV Service
sponsored by Webroot
WHITE PAPER: This informative whitepaper explores one company's success with simplified anti-virus services and how it provided their system with the security it was lacking.
Posted: 30 Apr 2014 | Published: 31 Dec 2013

Webroot

Case Study: A Large Multi–Program National Laboratory Stays Ahead of Next-Generation Malware By Deploying FireEye Web Malware Protection System
sponsored by FireEye
CASE STUDY: This case study will outline how one company trusted FireEye's Web Malware Protection System to guard their highly sensitive information and how well the system performed. You will also learn about the features the security solutions contains and how it could be perfect for your business.  
Posted: 10 May 2011 | Published: 10 May 2011

FireEye

Case Study: Antivirus Business Exceeds Mitsubishi Polysilicon’s Needs for Malware Protection
sponsored by Threat Track Security
CASE STUDY: This brief case study demonstrates how Mitsubishi Polysilicon implemented an improved anti-malware solution that eliminated downtime during scans, resulting in improved productivity and streamlined business processes.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security

Case Study: County Withstands a Near-Crippling Cyberattack
sponsored by Hewlett-Packard Enterprise
CASE STUDY: In this case study, discover how San Deigo County withstood this almost devastating attack on election night.
Posted: 13 Feb 2014 | Published: 31 Oct 2013

Hewlett-Packard Enterprise

Case Study: Providence College Captures Previously Undetected Attacks with FireEye Web Malware Protection System
sponsored by FireEye
CASE STUDY: This case study will show how Providence College was able to keep there network secure from advanced malware attacks, and how this security solution could do the same for you.
Posted: 10 May 2011 | Published: 10 May 2011

FireEye

Case Study: Rochford District Council Secures 25 Years' of History with Acronis
sponsored by Acronis NEMEA
CASE STUDY: Like many local governmental organisations, Rochford District Council depends heavily on the continual availability of its IT systems. Having a reliable disaster recovery strategy in place is an essential component of the Council’s IT strategy. Read on to learn more.
Posted: 31 May 2011 | Published: 31 May 2011

Acronis NEMEA

Case Study: School District Stops Breaches with Heightened Network Visbility
sponsored by Lancope
WHITE PAPER: Access this case study to discover how a large school district blocked breaches with network visibility, improved its incident response time, and more.
Posted: 30 Dec 2015 | Published: 30 Dec 2015

Lancope

Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

NetIQ

Cisco 2014 Annual Security Report
sponsored by Sourcefire
WHITE PAPER: This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Sourcefire
176 - 200 of 1154 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement