IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Detection Systems  >  

Host-Based Intrusion Detection Systems (HIDS)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet.
Host-Based Intrusion Detection Systems (HIDS)Reports
201 - 225 of 1132 Matches Previous Page  | Next Page
Closing the Biggest Hole in Web Application Delivery
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper explores a strategy for closing the biggest hole in web application delivery.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

CA Technologies.

Closing the Circle: How to Get Manageable Endpoint, Mobile Device and Web Security Together
sponsored by IBM
WHITE PAPER: This whitepaper discusses why it is necessary to implement security solutions that protect endpoints and mobile devices together, and to discover one company's suggestions for ameliorating this area of vulnerability within your organisation.
Posted: 24 Feb 2014 | Published: 20 Mar 2013

IBM

Cloud and Compliance in One – Is It Possible?
sponsored by Intel Security
WHITE PAPER: Read this insightful report on an integrated security system that help organization stay protected and compliant in cloud-based environments.
Posted: 09 Sep 2014 | Published: 31 Dec 2013

Intel Security

Cloud Security as a Service For Secure Cloud-Based Server Hosting
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide where industry specialist Joseph Granneman highlights the need for cloud-specific security tools, such as encryption and identity management, and how they can be offered as a service to better mitigate cloud computing risks.
Posted: 27 Nov 2013 | Published: 20 Apr 2011

SearchSecurity.com

Cloud Security Certification Guide
sponsored by TechTarget
RESOURCE: Which certifications could help improve your skill set and better prepare you to handle today's cloud security pain-points? Take our 2 min cloud security challenges survey and gain access to an exclusive reference guide designed to help you understand which certification is most beneficial for your career!
Posted: 05 Feb 2014 | Published: 05 Feb 2014

TechTarget

Cloud-based Enterprise Identity Management Using OAuth
sponsored by Forum Systems
WHITE PAPER: This resource highlights an authentication and authorization solution that offers protection beyond the username and password-only level.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Forum Systems

Combat the Latest Security Attacks with Global Threat Intelligence
sponsored by IBM
WHITE PAPER: In this white paper, learn how to approach today's advanced threat landscape by first understanding the source of attacks, then developing threat intelligence to better detect and analyze new threats to help maximize defense efforts.
Posted: 06 Mar 2014 | Published: 30 Sep 2013

IBM

Combatting Digital Fraud: A CIO Report
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this informative white paper, explore a web threat detection solution that leverages big data to enable security teams to better combat digital fraud.
Posted: 29 Aug 2014 | Published: 30 Jun 2014

RSA, The Security Division of EMC

Coming at You: How to Deal with the Latest DDoS Attacks
sponsored by SearchSecurity.com
EBOOK: Diversity. Usually it's a good thing, but not with distributed denial-of-service attacks, which are getting more varied and more lethal. Here's what to do about that.
Posted: 14 May 2014 | Published: 15 May 2014

SearchSecurity.com

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by LogRhythm, Inc.
WHITE PAPER: Check out this Magic Quadrant report for security information and event management to see how leading vendors compare and contrast.
Posted: 29 Jul 2014 | Published: 25 Jun 2014

LogRhythm, Inc.

Compliance - Protecting Payment Information with PCI DSS
sponsored by GlobalScape
WHITE PAPER: This informative whitepaper outlines strategies for protecting your customer data, remaining compliant and explains why complying with regulations won't ensure security.
Posted: 07 Jul 2014 | Published: 31 Dec 2013

GlobalScape

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

Cloud Computing Insider Threats: Exploring Risk Scenarios, Mitigations
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert e-guide highlights possible insider threat scenarios, as well as 11 security issues to consider when choosing a cloud service provider.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Dell, Inc. and Intel®

Cloud Endpoint Security: Considerations for Cloud Security Services
sponsored by Symantec Corporation
EGUIDE: This E-Guide from SearchSecurity.com explains the benefits of cloud endpoint security services and unveils a number of considerations to keep in mind before adoption. View now to learn more!
Posted: 26 Feb 2013 | Published: 26 Feb 2013

Symantec Corporation

Cloud rEvolution: A Workbook for Cloud Computing in the Enterprise
sponsored by CSC
WHITE PAPER: This white paper will get you up to speed on all aspects of cloud computing. It will help you examine cloud opportunities, review potential issues, and consider where and how specific information should be processed in your organization. Check out this white paper to learn more.
Posted: 17 Nov 2010 | Published: 17 Nov 2011

CSC

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

Cloud Storage for Dummies
sponsored by Hitachi Data Systems
EBOOK: When faced with the moment-by-moment business and IT pressures swirling around any large data center,a boiling cauldron may come to mind. Today’s enterprise organizations are keenly seeking ways to securely and cost effectively address rampant multifaceted data growth with flat or shrinking budgets.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Hitachi Data Systems

Cloud storage options for primary or nearline data
sponsored by Iomega Corporation, an EMC Company
WHITE PAPER: Cloud storage can be used for more than disaster recovery, archiving and backup. Access this E-Guide to learn why storing primary data in the could is a viable, and beneficial option.
Posted: 08 Aug 2012 | Published: 08 Aug 2012

Iomega Corporation, an EMC Company

Cloud-Based ERP Adoption and Integration Challenges
sponsored by Kenandy
EGUIDE: This expert e-guide from SearchManufacturingERP.com explores key challenges of ERP integration and explains why more and more organizations are eyeing the cloud-based ERP option.
Posted: 29 Jan 2014 | Published: 29 Jan 2014

Kenandy

Cloud-Based Security Threats Present Challenges and Opportunities for MSPs
sponsored by Webroot
WHITE PAPER: This guide explores the current cloud-based security threats and how MSPs can face the challenge head on.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

Webroot

Cloud-delivered Endpoint Security
sponsored by Webroot
WHITE PAPER: Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.
Posted: 05 Sep 2012 | Published: 30 Apr 2012

Webroot

Combatting Advanced Threats with Endpoint Security Intelligence
sponsored by IBM
WHITE PAPER: Read this resource to explore an integrated approach that combines the capabilities of endpoint management with security intelligence to close gaps against a malicious threat environment.
Posted: 13 May 2014 | Published: 31 Jan 2014

IBM

Comparing Data Center Batteries, Flywheels, and Ultracapacitors
sponsored by APC by Schneider Electric
WHITE PAPER: This paper explores several popular classes of batteries, compares batteries to both flywheels and ultracapacitors, and briefly discusses fuel cells.
Posted: 10 Jul 2008 | Published: 01 Jul 2008

APC by Schneider Electric

Comparing Servers for Oracle Database 11g Upgrades
sponsored by HP & Intel®
EBOOK: In this e-book, readers can View a technical comparison of four servers capable of running Oracle 11g and determine Which edition of Oracle 11g best fits their needs. Additionally, expert advice is given on in-place upgrade vs. a migration upgrade.
Posted: 21 May 2010 | Published: 21 May 2010

HP & Intel®

Complete and Scalable Access Management
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd
201 - 225 of 1132 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement