IT Systems  >   Business Systems  >   Security Systems  >  

Intruder Detection System

RSS Feed    Add to Google    Add to My Yahoo!
Intruder Detection SystemReports
 
Information Security Essential Guide: The Evolution of Threat Detection and Management
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.
Posted: 18 Jul 2013 | Published: 31 May 2013

SearchSecurity.com

Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

LogRhythm, Inc.

Best Practices for Utilizing Network Monitoring Switches in Cisco Environments
sponsored by Ixia
WHITE PAPER: Access this white paper to discover how network monitoring switches can help overcome the challenges of deploying packet-based monitoring in a Cisco network.
Posted: 03 Mar 2014 | Published: 31 Mar 2013

Ixia

SIEM Optimization: Ensuring Compliance and Security
sponsored by LogRhythm, Inc.
WEBCAST: Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization.
Posted: 03 Sep 2013 | Premiered: Sep 3, 2013

LogRhythm, Inc.

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
sponsored by Dell Software
WHITE PAPER: Sophisticated exploits that utilize advanced evasion techniques are all too common. Anti-evasion data-normalizing techniques are critical to an effective IPS, since evasions that aren't decoded and detected effectively render the IPS useless.
Posted: 12 May 2014 | Published: 12 May 2014

Dell Software

SANS What Works in Intrusion Prevention and Detection
sponsored by Sourcefire
PRODUCT LITERATURE: This white paper shows you how TransUnion was able to successfully implement an effective intrusion defense system (IDS) that helped them meet compliance requirements and secure their corporate environment.
Posted: 20 Nov 2007 | Published: 01 May 2007

Sourcefire

Magic Quadrant for Intrusion Prevention Systems
sponsored by Sourcefire
WHITE PAPER: This guide explores one company's intrusion prevention system and how it can integrate smoothly with your next-generation firewalls to ensure top-notch security.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Multiple Lines of Defense
sponsored by ENDFORCE, Inc
WHITE PAPER: No single countermeasure can protect your network from every conceivable threat, this white paper examines how to effectively mitigate risk by implementing an integrated multilayered security system for controlling endpoint attacks.
Posted: 05 Apr 2006 | Published: 31 Dec 2005

ENDFORCE, Inc

Expert eBook: Encryption: Properly Securing Your Valuable Data
sponsored by Information Security Magazine
WHITE PAPER: Check out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.
Posted: 28 Oct 2008 | Published: 28 Oct 2008

Information Security Magazine

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement