IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Host IDS

RSS Feed    Add to Google    Add to My Yahoo!
Host IDSReports
 
How Alert Logic Helped BancBox to Protect Payment Information in the Cloud
sponsored by Alert Logic
WHITE PAPER: This white paper describes Alert Logic's collaboration with BancBox, a payment service provider, to find a way to protect payment information and meet PCI compliance mandates in a cloud environment.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Alert Logic

Is Your Platform Secure? Really?
sponsored by IBM
WHITE PAPER: This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

IBM

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos, Inc.
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 06 Jul 2014 | Published: 02 Jul 2014

Sophos, Inc.

Justifying a Computer Incident Response Plan
sponsored by Dell SecureWorks
WHITE PAPER: This essential resource explores the need for effective incident response in order to reduce the costs of data breaches and mitigate risk. It also outlines best practices for creating an effective Computer Incident Response Plan (CIRP) – read on to learn more now.
Posted: 07 Feb 2013 | Published: 07 Feb 2013

Dell SecureWorks

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It
sponsored by Google Apps
PRESENTATION TRANSCRIPT: Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents.
Posted: 19 Jan 2011 | Published: 19 Jan 2011

Google Apps

How To Secure Electronic Healthcare Records Effectively
sponsored by HP & Intel®
WHITE PAPER: This white paper highlights important ways to prevent intrusion and block attacks with a security approach that’s comprehensive, automated, and proactive. That way, your organization can ease the worry of facing hefty financial penalties in the face of a data breach.
Posted: 19 Jun 2012 | Published: 19 Jun 2012

HP & Intel®

Practitioner's Guide to Establishing a SOC
sponsored by AlienVault
WHITE PAPER: This whitepaper provides an overview of how to evaluate the security controls needed to establish a Security Operation Center (SOC), along with what data a SOC needs to quickly detect and respond to a breach.
Posted: 12 Jul 2013 | Published: 09 Apr 2013

AlienVault

Enterprise Security and your Technology
sponsored by Hewlett-Packard Company
WEBCAST: This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett-Packard Company

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AlienVault
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AlienVault

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos, Inc.
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement