IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Detection Systems  >  

Host-Based Intrusion Detection Systems (HIDS)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet.
Host-Based Intrusion Detection Systems (HIDS) Reports
251 - 275 of 1542 Matches Previous Page  |  Next Page
Case Study: Arla Foods Streamlines Software Complexity with Centrally Managed License System
sponsored by Snow Software
CASE STUDY: Access this case study to discover how Arla Foods ensured a strong, demonstrable ROI for software investments and streamlined IT asset management with a centrally managed license system. Read on to view benefits achieved, such as improved data access for generating compliance reports, and more.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Snow Software

Case Study: How John Lewis Conquered the Web
sponsored by ComputerWeekly.com
BOOK: Bill Goodwin tells the inside story of John Lewis £40m website redevelopment project, assesses the technical and business challenges faced and its impact on the business.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

Case Study: How Secrid Stays Connected to Sell Globally
sponsored by NetSuite
VIDEO: Watch this 2 minute case study to learn how Secrid, a secure wallet designer based in the Netherlands, uses a platform to sell their products around the world and coordinate with sales teams in an easy-to-navigate environment.
Posted: 17 Oct 2016 | Premiered: 16 Mar 2016

NetSuite

Case Study: How the Diamond Model of Intrusion Analysis Unveiled Key Details About Malicious Activity
sponsored by ThreatConnect
WHITE PAPER: In the following case study, discover ways to gain a holistic view of threat intelligence and incident response so you can unite your entire security operations around a common defense, make informed business decisions, and more.
Posted: 01 May 2017 | Published: 01 May 2017

ThreatConnect

Case Study: How the University of Salzburg Built a Self-Service IT Portal
sponsored by Red Hat
CASE STUDY: Learn from the Paris Lodron University of Salzburg's case how using an IaaS cloud platform enabled them to streamline access to IT services and resources. Access now to learn how to achieve automated deployment of IT services, improve resource scalability with integrated open source solutions, and more.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Red Hat

Case Study: IT Automation at Allegiant Airlines
sponsored by Red Hat
VIDEO: Tune into this case study to see how Allegiant Airlines saves 10-15 man hours per week managing their Linux systems with an IT automation and configuration tool. Discover how to automate all systems simultaneously to empower DevOps initiatives within your enterprise.
Posted: 13 Jan 2017 | Premiered: 13 Jan 2017

Red Hat

CEB IT Budget Benchmark 2015 to 2016
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Corporate IT budgets are expected to grow by just 2.0% in the coming year, with budgets for 'keeping the lights on' expected to surpass capital spending for the first time since 2009, this report from CEB reveals.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

ComputerWeekly.com

Choose the Path to Complete Mobile Security and Productivity
sponsored by MobileIron
WHITE PAPER: Learn how MobileIron and Blackberry match up on vital criteria for enterprise mobility management and how your organization can reap the benefits of pairing with the right one for your particular needs.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

MobileIron

Choosing a Unified Mobile and Cloud Security Platform
sponsored by MobileIron
RESOURCE: Discover how to secure email and mobile apps and learn about MobileIron's EMM platform that was built from the ground up to secure mobile, cloud, and desktop devices, regardless of their OS.
Posted: 24 May 2017 | Published: 24 May 2017

MobileIron

Choosing the Right Provider for Mobile and Cloud Security
sponsored by MobileIron
WHITE PAPER: Learn about a mobile and cloud security provider that can help you secure any mobile app or cloud service on any device, simplify user access with certificate-based authentication, and more.
Posted: 04 Apr 2017 | Published: 30 Dec 2016

MobileIron

CIO and IT leadership survey
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: IT budgets are increasing and IT leaders have more influence at board level as organisations invest in agile, innovative projects, according to this survey by IT management consultant Coeus Consulting.
Posted: 08 Apr 2016 | Published: 08 Apr 2016

ComputerWeekly.com

CIO Trends #3
sponsored by ComputerWeekly.com
EGUIDE: This guide offers a collection of our most popular articles for IT leaders during the last part of 2016, looking at what it takes to be a great CIO and how to get the most out of your IT budget.
Posted: 12 Dec 2016 | Published: 12 Dec 2016

ComputerWeekly.com

CIO Trends #4
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we look at the topics that should be high on the agenda for anyone wanting to stay on top of their game- and the challenges that come with that. Find out what makes a successful IT leader in 2017, from looking outwards to learning lessons from digital transformation, and how to converge IT and digital skills in your organisation.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

ComputerWeekly.com

CIO Trends Asean Q1 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide offers a collection of our most popular articles for IT leaders in Asean during the first few months of 2016, examining the changing role of CIOs and how to enhance their relationships with their peers across the business.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

ComputerWeekly.com

Case Study: A Large Multi–Program National Laboratory Stays Ahead of Next-Generation Malware By Deploying FireEye Web Malware Protection System
sponsored by FireEye
CASE STUDY: This case study will outline how one company trusted FireEye's Web Malware Protection System to guard their highly sensitive information and how well the system performed. You will also learn about the features the security solutions contains and how it could be perfect for your business.  
Posted: 10 May 2011 | Published: 10 May 2011

FireEye

Case Study: Antivirus Business Exceeds Mitsubishi Polysilicon’s Needs for Malware Protection
sponsored by Threat Track Security
CASE STUDY: This brief case study demonstrates how Mitsubishi Polysilicon implemented an improved anti-malware solution that eliminated downtime during scans, resulting in improved productivity and streamlined business processes.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security

Case Study: County Withstands a Near-Crippling Cyberattack
sponsored by Hewlett-Packard Enterprise
CASE STUDY: In this case study, discover how San Deigo County withstood this almost devastating attack on election night.
Posted: 13 Feb 2014 | Published: 31 Oct 2013

Hewlett-Packard Enterprise

Case Study: Global Security Management Made Easier for Leading IT Service Provider
sponsored by Intel Security
CASE STUDY: Discover how to unify endpoint management with a centralized security platform thanks to this case study. Read on to learn how a leading IT service provider tamed their endpoint chaos, and see how you can boost the efficiency of your security operations with a unified security platform that eliminates centralized management pain points.
Posted: 10 May 2016 | Published: 10 May 2016

Intel Security

Case Study: Providence College Captures Previously Undetected Attacks with FireEye Web Malware Protection System
sponsored by FireEye
CASE STUDY: This case study will show how Providence College was able to keep there network secure from advanced malware attacks, and how this security solution could do the same for you.
Posted: 10 May 2011 | Published: 10 May 2011

FireEye

Case Study: Rochford District Council Secures 25 Years' of History with Acronis
sponsored by Acronis NEMEA
CASE STUDY: Like many local governmental organisations, Rochford District Council depends heavily on the continual availability of its IT systems. Having a reliable disaster recovery strategy in place is an essential component of the Council’s IT strategy. Read on to learn more.
Posted: 31 May 2011 | Published: 31 May 2011

Acronis NEMEA

Case Study: School District Stops Breaches with Heightened Network Visbility
sponsored by Lancope
WHITE PAPER: Access this case study to discover how a large school district blocked breaches with network visibility, improved its incident response time, and more.
Posted: 30 Dec 2015 | Published: 30 Dec 2015

Lancope

Case study: Sicoob avoids USD 1.5 million in annual costs with IBM
sponsored by IBM
CASE STUDY: This case study reveals how Credit Union System for Brazil (Sicoob), the largest credit union system in Brazil, replaced their existing IT infrastructure with a virtualized Linux landscape, allowing them to avoid USD 1.5 million in annual costs.
Posted: 20 Mar 2014 | Published: 31 May 2013

IBM

Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

NetIQ

CIOs Future-Proof the Data Center with Hybrid Strategies
sponsored by Attenda
EGUIDE: In this expert e-guide, we explore how to design a hybrid strategy that helps balance public and private cloud services with on-premise systems. Hear from a variety of CIOs who have successfully integrated legacy and cloud technology to take a more flexible and efficient approach to managing their data centers.
Posted: 25 Oct 2016 | Published: 24 Oct 2016

Attenda

CIOs Move IT from an ITIL Operational View of Services to a Strategic Business Focus
sponsored by Gartner
ANALYST REPORT: This service portfolio from Gartner offers an analysis of common challenges CIOs face when communicating the strategic business value of moving from process-optimized to service optimized IT operations. Download now to receive expert recommendations for understanding the business context for service delivery.
Posted: 03 Aug 2016 | Published: 22 Feb 2016

Gartner
251 - 275 of 1542 Matches Previous Page    9 10 11 12 13 14    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement