IT Systems  >   Business Systems  >   Security Systems  >  

ID Systems

RSS Feed    Add to Google    Add to My Yahoo!
ID Systems Reports
 
Buyer's Guide: Network Monitoring Tools
sponsored by TechTarget
RESOURCE: In this complimentary e-guide, learn more about monitoring tools, how network monitoring works, and the difference between nice-to-have and need-to-have features in order to determine the best tool to monitor your network's performance.
Posted: 03 May 2017 | Published: 30 Nov 2015

TechTarget

Cyber Attacks on the Rise: IBM 2007 Report
sponsored by IBM
WHITE PAPER: This white paper shows how the IBM Internet Security Systems™ X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.
Posted: 19 Nov 2007 | Published: 01 Aug 2007

IBM

Practitioners Guide to Establishing a SOC Webinar
sponsored by AlienVault
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AlienVault

Stopping Crimeware In Its Tracks
sponsored by FireEye
WHITE PAPER: This paper describes the damaging cybercrime threat posed by botnets, explains why traditional security solutions cannot stop them, and proposes a new approach that can eradicate cybercrime from corporate networks.
Posted: 29 Sep 2008 | Published: 01 Sep 2008

FireEye

Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

LogRhythm, Inc.

Obstructed View
sponsored by Information Security Magazine
JOURNAL ARTICLE: Encryption may be good for securing data, but it blinds network-based IDSes. While there aren't any surefire fixes, these techniques will steer you in the right direction.
Posted: 14 Sep 2006 | Published: 01 Sep 2006

Information Security Magazine

Integrating Mobile Access into Your VPN Environment
sponsored by AT&T Corp
WHITE PAPER: Enterprises are increasingly facing the task of integrating a variety of access services and devices onto their Virtual Private Networks (VPN). This white paper takes a closer look at some key issues that arise when bringing access methods into your VPN.
Posted: 31 May 2007 | Published: 07 Jun 2006

AT&T Corp

Battling Modern Botnets
sponsored by FireEye
WHITE PAPER: The FBI ranks cybercrime among its top priorities in part because botnets are proliferating at an alarming rate, crossing corporate boundaries and spreading infections behind corporate firewalls. Learn how FireEye provides advance detection and a blended approach to today’s botnet problem that "traditional" solutions do not.
Posted: 01 Sep 2009 | Published: 28 Apr 2008

FireEye

Enterprise Security and your Technology
sponsored by Hewlett Packard Enterprise
WEBCAST: This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett Packard Enterprise

Magic Quadrant for Network Intrusion Prevention Systems
sponsored by McAfee.
ANALYST REPORT: This research paper analyzes the market, evolution, and use cases of network-based IPS. View now to explore IPS vendors in the market, and discover where they rank in Gartner’s Magic Quadrant.
Posted: 15 Aug 2011 | Published: 06 Dec 2010

McAfee.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement