IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Detection Systems  >  

Host-Based Intrusion Detection Systems (HIDS)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet.
Host-Based Intrusion Detection Systems (HIDS) Reports
26 - 50 of 1145 Matches Previous Page  |  Next Page
A Computer Weekly buyer's guide to testing and code quality
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide.
Posted: 19 May 2014 | Published: 19 May 2014

ComputerWeekly.com

A Guide to Cyber Risk
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

A Guide to Enterprise Linux For IBM Z Systems
sponsored by Red Hat
DATA SHEET: In this datasheet, you will discover how to extend your IBM z Systems to accommodate more applications and emerging workloads by implementing Red Hat Enterprise Linux. Read on to better utilize your available computing resources.
Posted: 19 Jan 2016 | Published: 31 Dec 2015

Red Hat

A Guide to Essential Analytics Tools for New Healthcare Models
sponsored by SAS
WHITE PAPER: In this resource, you will compare the differing types of episode analytics, and discover how healthcare providers use these analytics for payment bundling in real-world scenarios. Read on now to discover how to reduce variations that will negatively impact care outcomes and lead to higher costs.
Posted: 06 Jan 2016 | Published: 31 Dec 2014

SAS

A Guide to Innovating the Infrastructure of Your Financial Services Institution
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this resource, you will discover a model for guiding your financial services business, step by step, through technology adoption dilemmas, and it also outlines the opportunities presented by mobility, big data, and cloud computing.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

Hewlett-Packard Enterprise

A Guide to Password Use in WebSphere Application Server
sponsored by Global Knowledge
WHITE PAPER: Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge

A Guide to Protecting your Critical Assets with Identity Governance
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on now to protect assets, and control access risks and separation-of-duties (SoD) violations, by enforcing business-driven identity governance for managing user roles.
Posted: 26 Jan 2016 | Published: 31 Mar 2015

IBM

A New Guide to Critical Capabilities for Mobile Data Protection Solutions
sponsored by Digital Guardian
WHITE PAPER: In this white paper you will discover solutions for MDP to defend access to storage systems found in laptops, removable media and cloud environments. You will learn how to enforce secure policies across multiple platforms at minimal costs.
Posted: 28 Jan 2016 | Published: 08 Sep 2014

Digital Guardian

A Performance-Centric Approach to Mainframe Cost Optimization
sponsored by Global Technology Solutions Group
WHITE PAPER: When Global Technology Solutions Group, a company who spends a lot of time on the mainframe, was asked how to run it more efficiently from a cost perspective, they responded with their own approach. This white paper takes a brief look at that approach and its three key areas – hardware, software, and personnel.
Posted: 18 Feb 2016 | Published: 18 Feb 2016

Global Technology Solutions Group

A Practical Guide to Choosing the Right IT Systems
sponsored by Oracle, in association with Intel
WHITE PAPER: In the following white paper, learn about the importance of choosing the right IT systems. Read on now and learn about the potential downfalls of choosing the inappropriate systems for your niche, where to turn for advice on the right systems, and more.
Posted: 22 Sep 2015 | Published: 22 Sep 2015

Oracle, in association with Intel

8 Common Mistakes of Windows 7 Migration
sponsored by Dell, Inc.
WEBCAST: Join this interactive webcast to learn more about:• Common mistakes that people make during the OS migration project • How Dell overcame mistakes we made during our migration • How Dell helped other companies overcome common mistakes • Goodness that came out of the migration program
Posted: 15 Apr 2011 | Premiered: Apr 27, 2011, 12:00 EDT (16:00 GMT)

Dell, Inc.

8 Essentials of Business Analytics
sponsored by SAS
WHITE PAPER: Leading banks use business analytics to predict and prevent credit fraud, saving millions. Retailers use business analytics to predict the best location for stores and how to stock them. But these advanced business applications tell only part of the story. What's going on inside these market-leading companies that sets them apart?
Posted: 29 Jul 2010 | Published: 29 Jul 2010

SAS

A Brazilian company adopts IBM System z to handle rapid business growth
sponsored by IBM
WEBCAST: This on-demand video case study explains how Sicoob, Brazil's largest cooperative credit system, achieved high performance and scalability by investing in the right server platform, allowing the company to accommodate business growth.
Posted: 21 Feb 2014 | Premiered: May 29, 2013

IBM

A Buyer's Guide to Endpoint Protection Platforms
sponsored by Intel Security
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

Intel Security

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

A Cohesive Approach to Addressing Advanced Targeted Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This resource features a 5-component threat prevention framework that takes existing technologies to the next level to better protect your vulnerable networks from today's advanced threats.
Posted: 09 May 2014 | Published: 09 May 2014

Fortinet, Inc.

A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER: This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012

Vormetric

A Comprehensive Guide to the Latest Threat Detection Technologies
sponsored by SearchSecurity.com
WHITE PAPER: This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com

A free Demonstration of Panda Cloud Systems Management
sponsored by Panda Security
SOFTWARE DEMO: Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

Panda Security

A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls
sponsored by Sophos, Inc.
WHITE PAPER: Unified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM system.
Posted: 20 Dec 2013 | Published: 30 Nov 2013

Sophos, Inc.

A Manifesto for Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Symantec Corporation

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper so you can gain a better understanding of the definition of SIEM and log management tools and what they can do for you. Find out more about the features of SIEM and what you should look for when selecting a product.
Posted: 01 Oct 2012 | Published: 01 Oct 2012

Tripwire, Inc.

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM
26 - 50 of 1145 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement