IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Detection Systems  >  

Host-Based Intrusion Detection Systems (HIDS)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet.
Host-Based Intrusion Detection Systems (HIDS) Reports
226 - 250 of 1406 Matches Previous Page  |  Next Page
Buying Criteria for Next-Generation Network Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

BYOD & MDM: Why you’re still at risk – and what you can do about it
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper discover how you can reap the benefits of BYOD and MDM while also keeping your data and devices secure. Also uncover 9 threats that MDM solutions often fail to catch.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Proofpoint, Inc.

BYOD: Keeping the Benefits While Staying Secure
sponsored by IBM
EGUIDE: In this e-guide, learn not only to maximize the benefits of BYOD for your enterprise, but also discover the how to mitigate the downsides and secure the traffic coming out of all these devices connecting to your network.
Posted: 29 Jul 2016 | Published: 28 Jul 2016

IBM

Can a CASB Protect You from the 2016 Treacherous 12?
sponsored by Palerra Inc.
WHITE PAPER: Is a Cloud Access Security Broker (CASB) solution ideal for your enterprise's cloud security needs? Discover how CASBs provide a variety of advantages, uncover a step-by-step comparison of a CASB solution to the "Treacherous 12" threats identified by the Cloud Security Alliance, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

Palerra Inc.

Can a CASB Protect You from the 2016 Treacherous 12? Infographic
sponsored by Palerra Inc.
RESOURCE: Uncover if a Cloud Access Security Broker (CASB) is ideal for your enterprise's cloud security needs. Consult this infographic to see how CASBs measure up against the "Treacherous 12" threats identified by the Cloud Security Alliance, find detailed examples of cloud security issues and strategies relevant to your enterprise, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

Palerra Inc.

Can New Security Tools Keep Your Network Clean?
sponsored by SearchSecurity.com
EZINE: Modern networks have immense amounts of data passing through them daily, and keeping that data clean of sophisticated malware is a sizable undertaking. In this issue of Information Security, learn what advanced monitoring tools are right for your network's particular needs.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

SearchSecurity.com

Case study : How the French Ministry of Education strengthens front-end security
sponsored by Forcepoint
CASE STUDY: Learn how the largest employer in France, the Ministry of Education, updated its massive network to include a powerful next-gen firewall (NGFW) that could support standard central services but also decentralized campus structures and data centers.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

Forcepoint

Case Study: Cut Mobile Data Costs and Bolster Security
sponsored by Wandera
CASE STUDY: Discover how Hillcrest identified and addressed its mobile data usage problem, and now is enjoying annual savings of roughly €34,700, equating to an 850% ROI. Learn how it cut its mobile bills by 68% and also protects its workers from browser malware, leaking apps, phishing attacks, poisoned cache exploits, and more.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

Wandera

Case Study: How John Lewis Conquered the Web
sponsored by ComputerWeekly.com
BOOK: Bill Goodwin tells the inside story of John Lewis £40m website redevelopment project, assesses the technical and business challenges faced and its impact on the business.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

Case study: Sicoob avoids USD 1.5 million in annual costs with IBM
sponsored by IBM
CASE STUDY: This case study reveals how Credit Union System for Brazil (Sicoob), the largest credit union system in Brazil, replaced their existing IT infrastructure with a virtualized Linux landscape, allowing them to avoid USD 1.5 million in annual costs.
Posted: 20 Mar 2014 | Published: 31 May 2013

IBM

CEB IT Budget Benchmark 2015 to 2016
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Corporate IT budgets are expected to grow by just 2.0% in the coming year, with budgets for 'keeping the lights on' expected to surpass capital spending for the first time since 2009, this report from CEB reveals.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

ComputerWeekly.com

CA ARCserve Backup r12.5 SRM Features
sponsored by arcserve
VIDEO: CA ARCserve Backup r12.5 uses a three-tier architecture within a domain. Check out this demonstration for an explanation of the CA ARCserve Backup r12.5 SRM Features, including architecture, dashboard overview, nodes and tiers, and SRM probe.
Posted: 28 May 2010 | Premiered: 28 May 2010

arcserve

CA Technologies Strategy & Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource details a cloud-based identity and access management (IAM) solution designed to secure access to cloud-based services and apps, simplify IAM both on-premises and in the cloud, and improve efficiency. View now to learn more!
Posted: 19 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

CA Virtualization Management Solution Brief
sponsored by CA Technologies.
PRODUCT LITERATURE: CA Virtualization Management solutions provide integrated end-to-end management, business-driven automation and security. As such, CA facilitates virtualization's promise of cost reduction and efficiency gains through consolidation, standardization and lower energy consumption, which drive better business outcomes.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

CA Technologies.

Can a Federated Identity Service Strengthen SSO?
sponsored by Radiant Logic, Inc.
WHITE PAPER: With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure
Posted: 04 Jun 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Case Study - Anittel Simplifies Managed AV Service
sponsored by Webroot
WHITE PAPER: This informative whitepaper explores one company's success with simplified anti-virus services and how it provided their system with the security it was lacking.
Posted: 30 Apr 2014 | Published: 31 Dec 2013

Webroot

Case Study: A Large Multi–Program National Laboratory Stays Ahead of Next-Generation Malware By Deploying FireEye Web Malware Protection System
sponsored by FireEye
CASE STUDY: This case study will outline how one company trusted FireEye's Web Malware Protection System to guard their highly sensitive information and how well the system performed. You will also learn about the features the security solutions contains and how it could be perfect for your business.  
Posted: 10 May 2011 | Published: 10 May 2011

FireEye

Case Study: Antivirus Business Exceeds Mitsubishi Polysilicon’s Needs for Malware Protection
sponsored by Threat Track Security
CASE STUDY: This brief case study demonstrates how Mitsubishi Polysilicon implemented an improved anti-malware solution that eliminated downtime during scans, resulting in improved productivity and streamlined business processes.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security

Case Study: County Withstands a Near-Crippling Cyberattack
sponsored by Hewlett-Packard Enterprise
CASE STUDY: In this case study, discover how San Deigo County withstood this almost devastating attack on election night.
Posted: 13 Feb 2014 | Published: 31 Oct 2013

Hewlett-Packard Enterprise

Case Study: Global Security Management Made Easier for Leading IT Service Provider
sponsored by Intel Security
CASE STUDY: Discover how to unify endpoint management with a centralized security platform thanks to this case study. Read on to learn how a leading IT service provider tamed their endpoint chaos, and see how you can boost the efficiency of your security operations with a unified security platform that eliminates centralized management pain points.
Posted: 10 May 2016 | Published: 10 May 2016

Intel Security

Case Study: Providence College Captures Previously Undetected Attacks with FireEye Web Malware Protection System
sponsored by FireEye
CASE STUDY: This case study will show how Providence College was able to keep there network secure from advanced malware attacks, and how this security solution could do the same for you.
Posted: 10 May 2011 | Published: 10 May 2011

FireEye

Case Study: Rochford District Council Secures 25 Years' of History with Acronis
sponsored by Acronis NEMEA
CASE STUDY: Like many local governmental organisations, Rochford District Council depends heavily on the continual availability of its IT systems. Having a reliable disaster recovery strategy in place is an essential component of the Council’s IT strategy. Read on to learn more.
Posted: 31 May 2011 | Published: 31 May 2011

Acronis NEMEA

Case Study: School District Stops Breaches with Heightened Network Visbility
sponsored by Lancope
WHITE PAPER: Access this case study to discover how a large school district blocked breaches with network visibility, improved its incident response time, and more.
Posted: 30 Dec 2015 | Published: 30 Dec 2015

Lancope
226 - 250 of 1406 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement