IT Systems  >   Business Systems  >   Security Systems  >  

ID Systems

RSS Feed    Add to Google    Add to My Yahoo!
ID Systems Reports
 
Intrusion Detection and Prevention: Decision Time
sponsored by SearchSecurity.com
EBOOK: Learn how to evaluate your potential vendor's IDS/IPS product and its ability to meet your specific business requirements.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SearchSecurity.com

Understanding Advanced Virtualization Security Practices
sponsored by Intel
EBOOK: SearchCloudSecurity.com presents a comprehensive guide to virtualization security. Our experts help you assess and prioritize the risks and threats to virtual environments. You’ll learn what steps you must take to handle secure multitenancy, hypervisor threats and hypervisor protection, and data management service security.
Posted: 19 Aug 2011 | Published: 18 Aug 2011

Intel

Magic Quadrant for Intrusion Prevention Systems
sponsored by IBM
WHITE PAPER: View this white paper to gain a key understanding on stand-alone IPS products and capabilities. It outlines the strengths and weaknesses of various vendors and what you should look for when you're searching for an IPS.
Posted: 19 Apr 2013 | Published: 05 Jul 2012

IBM

Stopping Crimeware In Its Tracks
sponsored by FireEye
WHITE PAPER: This paper describes the damaging cybercrime threat posed by botnets, explains why traditional security solutions cannot stop them, and proposes a new approach that can eradicate cybercrime from corporate networks.
Posted: 29 Sep 2008 | Published: 01 Sep 2008

FireEye

Unified Threat Management Guide for Managers
sponsored by Information Security Magazine
JOURNAL ARTICLE: It's a firewall, it's an IPS, it's antivirus, it's antispam... but is it right for you?
Posted: 24 Aug 2006 | Published: 01 Jun 2006

Information Security Magazine

How to Properly Secure Your Organization: Evolving Your Threat-Detection Techniques and Endpoint Security Strategy
sponsored by Bit9, Inc.
EGUIDE: Learn the steps of evolving your endpoint security strategy as well as the benefits and challenges that can arise when utilizing threat detection products.
Posted: 23 Oct 2013 | Published: 23 Oct 2013

Bit9, Inc.

SANS What Works in Intrusion Prevention and Detection
sponsored by Sourcefire
PRODUCT LITERATURE: This white paper shows you how TransUnion was able to successfully implement an effective intrusion defense system (IDS) that helped them meet compliance requirements and secure their corporate environment.
Posted: 20 Nov 2007 | Published: 01 May 2007

Sourcefire

Applying Security Holistically from the Cloud
sponsored by CloudAccess
WHITE PAPER: Consult this informative white paper to learn how the paradigm has shifted to security that's developed, deployed and managed from the cloud. Learn how to implement a holistic security strategy to protect all data in the enterprise.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

CloudAccess

Unified Security Management: Real-time Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014

AlienVault

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos, Inc.
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement