IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Detection Systems  >  

Host-Based Intrusion Detection Systems (HIDS)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet.
Host-Based Intrusion Detection Systems (HIDS) Reports
51 - 75 of 1159 Matches Previous Page  |  Next Page
A Roadmap to Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER: Discover what it takes to become cyber resilient in this informative white paper.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Symantec Corporation

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

Achieve paramount cloud security for your enterprise
sponsored by TechTarget
RESOURCE: Complete our 2 min cloud security challenges survey and gain access to an exclusive reference guide designed to help you achieve better cloud security for your enterprise and how to assess your risk before moving data processing or applications to the cloud.
Posted: 05 Feb 2014 | Published: 05 Feb 2014

TechTarget

Adapting to New Data Channels and Improving Performance with Converged Infrastructure
sponsored by Hewlett-Packard Company
WEBCAST: View this in-depth webcast to learn about the "new style" of IT and how you can leverage your staff to overcome the pressures and obstacles presented today. Watch now to discover the path to impact business performance around workforce productivity, business trends and intelligence, and customer acquisition and loyalty in the digital age.
Posted: 05 Dec 2014 | Premiered: Oct 22, 2014

Hewlett-Packard Company

Advance the Fight against Cyber Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces the benefits of security services and gives you advice on how to best take advantage of them.
Posted: 21 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper so you can gain a better understanding of the definition of SIEM and log management tools and what they can do for you. Find out more about the features of SIEM and what you should look for when selecting a product.
Posted: 01 Oct 2012 | Published: 01 Oct 2012

Tripwire, Inc.

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

A Roadmap for Big Data in Security Analytics
sponsored by EMC Corporation
WHITE PAPER: Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

EMC Corporation

A Six-Step Plan for Competitive Device Evaluations
sponsored by Ixia
WHITE PAPER: Discover a methodology for conducting product evaluations that provide insight into the performance, security and stability of devices within production and data center environments.
Posted: 05 May 2014 | Published: 31 Dec 2013

Ixia

A Step-By-Step Guide to Monetizing Cloud Data Protection and Collaboration
sponsored by Infrascale
WHITE PAPER: This resource offers 6 critical tips for MSPs to help clients secure sensitive business data in a growing endpoint and cloud-based environment.
Posted: 14 May 2014 | Published: 14 May 2014

Infrascale

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER: This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

FireEye

A UK Security Provider Fortifies its Systems for Greater Resiliency
sponsored by IBM
CASE STUDY: This informative case study explores one company's success with a disaster recovery plan and how it sought business continuity while ensuring security.
Posted: 08 Apr 2014 | Published: 31 Dec 2012

IBM

A World-class Pediatric Medical Center
sponsored by IBM
WHITE PAPER: As data growth skyrockets in hospital information systems, IT departments are realizing the challenge in managing data for compliance while maintaining a secure environment. This guide explores the importance of centralizing your security and compliance management.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

IBM

A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 30 Oct 2013 | Published: 30 Sep 2012

IBM

Accelerate the delivery of modern applications
sponsored by Hewlett-Packard Company
WHITE PAPER: An IT modernization project will be unique to your business, and to successfully manage it you'll need the appropriate tools, resources, and best practices throughout the process. Read this paper to get a framework for initiating your modernization efforts.
Posted: 28 Dec 2011 | Published: 30 Sep 2011

Hewlett-Packard Company

Accelerate the delivery of modern applications
sponsored by Hewlett-Packard Limited
WHITE PAPER: An IT modernization project will be unique to your business, and to successfully manage it you'll need the appropriate tools, resources, and best practices throughout the process. Read this paper to get a framework for initiating your modernization efforts.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Hewlett-Packard Limited

Accelerating Unified Communications With an Enterprisewide Architecture
sponsored by Avaya
WHITE PAPER: To support today’s business challenges, enterprises require a new architecture for communications that is standard, loosely coupled, three-tier and centralized.
Posted: 22 Sep 2011 | Published: 22 Sep 2011

Avaya

Accellion vs Box: 5 Key Reasons Enterprises Select Accellion
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn how Accellion's private cloud answers the need for a mobile, scalable, flexible file sharing solution that extends and reinforces enterprise security policies and controls.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Accellion, Inc.

Achieving Rapid Data Recovery for IBM AIX Environments: An Executive Overview of EchoStream for AIX
sponsored by Vision Solutions
PODCAST: This podcast looks closely at a unique data recovery solution for IBM AIX Environments called EchoStream for AIX.
Posted: 09 May 2008 | Premiered: May 9, 2008

Vision Solutions

Actuate Performancesoft Suite Product Tour
sponsored by Actuate
SOFTWARE DEMO: An effective method of monitoring and managing metrics is critical to increasing the performance of any organization. Learn how to gain visibility into all areas of concern and leverage insight into operations that stakeholders demand to ensure success.
Posted: 17 May 2007 | Premiered: 17 May 2007

Actuate

Adapting to the new web security and email security threats
sponsored by Cisco Systems, Inc.
EGUIDE: In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.
Posted: 06 May 2014 | Published: 06 May 2014

Cisco Systems, Inc.

Admiral Group ensures superb performance and scalability
sponsored by IBM
WHITE PAPER: Read this white paper to learn how one growing organization leveraged an advanced platform to scale and meet increasing demands. Discover how they were able to improve the overall performance of their systems, enabling them to cut costs and respond quicker to changing requirements.
Posted: 06 Jun 2012 | Published: 30 Jun 2011

IBM

Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER: This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

Advanced Cyber Threats Demand a New Privileged Account Security Model
sponsored by Cyber-Ark Software
WHITE PAPER: In this ESG report, discover how to better protect your privileged accounts by embracing new centralized architectural solutions.
Posted: 30 Jul 2014 | Published: 29 Jun 2013

Cyber-Ark Software
51 - 75 of 1159 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement