IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Detection

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Host Intrusion Detection, Network Intrusion Detection, Host IDS, Network IDS, Network Intrusion Management, ID
DEFINITION: Intrusion detection (ID) is a type of security management system for computers and networks. An ID system gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organization) and misuse (attacks from within the organization). ID uses vulnerability assessment (sometimes refered  … 
Definition continues below.
Intrusion DetectionReports
101 - 125 of 158 Matches Previous Page  | Next Page
IT Decision Checklist: Messaging Security
sponsored by SearchSecurity.com
EGUIDE: Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.
Posted: 03 Mar 2010 | Published: 03 Mar 2010

SearchSecurity.com

Understanding WMI Malware
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper will discuss how cybercriminals used Windows Management Instrumentation (WMI) as a venue to conveniently perform malicious activities on affected users' systems. The findings in this paper were based on a client-submitted case that TrendLabs engineers handled this March.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Your September Issue of Information Security Magazine– Readers’ Choice Awards
sponsored by Information Security Magazine
EGUIDE: In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.
Posted: 10 Sep 2010 | Published: 10 Sep 2010

Information Security Magazine

First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies
sponsored by ArcSight, an HP Company
WHITE PAPER: The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

ArcSight, an HP Company

How Does Virtualization Change Your Approach to Enterprise Security?
sponsored by GlassHouse Technologies, Inc.
WHITE PAPER: As with any new technology, in order to achieve a secure implementation, it is necessary to augment existing policies and practices with an understanding of how virtualization works. Read this paper to find out more.
Posted: 17 Jun 2010 | Published: 17 Jun 2010

GlassHouse Technologies, Inc.

Unified Threat Management Market Review: WatchGuard vs. Juniper, Cisco, Fortinet, and SonicWall
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Compare the major brands of security products by UTM throughput per MSRP dollar to see where you will get the best value for your money. Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming.
Posted: 01 Jun 2010 | Published: 01 Apr 2010

WatchGuard Technologies, Inc.

Server and Application Protection - Behind the Lines
sponsored by Trend Micro
WHITE PAPER: For organizations evaluating the benefits of server and application protection systems and making a case for incorporating them into the IT infrastructure, Trend Micro recommends examining nine different areas of business interest. This white paper details these topics and examines Trend Micro server and application protection software.
Posted: 17 Mar 2010 | Published: 01 Feb 2009

Trend Micro

Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’
sponsored by Information Security Magazine
EZINE: This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more.
Posted: 09 Mar 2010 | Published: 09 Mar 2010

Information Security Magazine

The Essentials Series: Security Information Management
sponsored by Dell SecureWorks
WHITE PAPER: This collection of articles from Realtime Publishers presents a clear and concise overview of security information management (SIM). The articles present the business case for SIM, operational and organizational issues, and hints and tips for ensuring a successful SIM implementation.
Posted: 02 Dec 2009 | Published: 09 Oct 2009

Dell SecureWorks

The Total Economic Impact Of McAfee’s Network Security Platform’s Intrusion Prevention System: Multicompany Analysis
sponsored by McAfee, Inc.
ANALYST REPORT: This June 2009 study examines the financial impact and potential return on investment (ROI) for McAfee Network Security Platform intrusion prevention system (formerly McAfee IntruShield®), using Adena Health System as a case study.
Posted: 23 Nov 2009 | Published: 29 Aug 2009

McAfee, Inc.

Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities
sponsored by IBM
WHITE PAPER: Security managers may work for midsize or large organizations; they may operate from anywhere on the globe. But inevitably, they share a common goal: to better manage the risks associated with their business infrastructure. Increasingly, Web application security plays a significant role in achieving that goal. Read on to learn more.
Posted: 09 Sep 2009 | Published: 01 Sep 2008

IBM

Enhance Security with Intel® vPro™ Technology
sponsored by Intel Corporation
VIDEO: Security and compliance are strong values even in a down economy. Hear from a variety of clients that have used Intel® vPro™ Technology to identify problems, disable and enable the network, enhance patch management, and enabled them to isolate threats quickly and efficiently.
Posted: 08 Sep 2009 | Premiered: 08 Sep 2009

Intel Corporation

This Month in the Threat Webscape for July 2009
sponsored by Websense, Inc.
VIDEO: In this video, learn more about the top techniques for defending your organization from Web threats. Techniques include the monitoring, classification, and identification of all Web content in real time.
Posted: 02 Sep 2009 | Premiered: 01 Sep 2009

Websense, Inc.

Battling Modern Botnets
sponsored by FireEye
WHITE PAPER: The FBI ranks cybercrime among its top priorities in part because botnets are proliferating at an alarming rate, crossing corporate boundaries and spreading infections behind corporate firewalls. Learn how FireEye provides advance detection and a blended approach to today’s botnet problem that "traditional" solutions do not.
Posted: 01 Sep 2009 | Published: 28 Apr 2008

FireEye

Real World Intrusion Prevention (IPS) for the Demands of a New Security Reality
sponsored by TippingPoint
WHITE PAPER: This whitepaper addresses primary areas that organizations must consider when evaluating possible solutions for intrusion prevention. Topics include: key network security challenged facing enterprises today; criteria for an effective IPS solution; And insights gained from enterprises already deploying IPS solutions in the real world.
Posted: 26 Aug 2009 | Published: 25 Aug 2009

TippingPoint

Preventing Data Breaches in Privileged Accounts Using Access Control
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper explores insider attacks, threats and risks involved across every enterprise. Also, we will recommend a sound, cost-saving solution to prevent a disaster from happening to a company's financial assets and reputation using access control.
Posted: 21 Aug 2009 | Published: 21 Aug 2009

BeyondTrust Corporation

Akershus University Hospital: Safeguarding patient privacy with security information and event management
sponsored by RSA, The Security Division of EMC
CASE STUDY: Since 1995, a series of new European regulations have been introduced to protect the security and privacy of personal data held by corporations and public bodies, particularly concerning the logging of access to sensitive information. Read this case study to learn how RSA keeps Akerus University Hospital secure and compliant.
Posted: 20 Aug 2009 | Published: 17 May 2009

RSA, The Security Division of EMC

Firewall Solutions for Small Business
sponsored by Cisco Systems, Inc.
WHITE PAPER: The ideal firewall solutions for small business integrate a hardware firewall with software controls into a comprehensive security solution that includes virtual private network (VPN) support, antivirus, antispam, antispyware, and content filtering capabilities.
Posted: 14 Aug 2009 | Published: 14 Aug 2009

Cisco Systems, Inc.

The SonicWALL Approach to Consolidating Network Security Infrastructure and Cutting Costs
sponsored by SonicWALL
BROCHURE: This brochure identifies the substantial benefits available to organizations that elect to replace their network security point products with UTM devices. It explains the combination of innovative features/functions and robust, platform-level capabilities that enable customers of SonicWALL UTM products to maximize their gains due to consolidation.
Posted: 24 Jul 2009 | Published: 24 Jul 2009

SonicWALL

Log Management E-book
sponsored by RSA, The Security Division of EMC
EBOOK: Log management is covering several important aspects of network security. The four major chapters of this E-book focus on the use of log management as it pertains to compliance, analysis, forensics, and an SIEM alternative. Read on to learn more.
Posted: 24 Jun 2009 | Published: 24 Jun 2009

RSA, The Security Division of EMC

Information Security Magazine, May 2009: Automating Compliance
sponsored by Information Security Magazine
EZINE: This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.
Posted: 11 May 2009 | Published: 01 May 2009

Information Security Magazine

Best Practices in Using Reputation-based Anti-Spam Services for Email Security
sponsored by IronPort Systems
WHITE PAPER: This white paper discusses the origins of IP reputation services; test results on Cisco IronPort's own reputation service, SenderBase; best practices in using reputation services; and the ROI of reputation services.
Posted: 17 Mar 2009 | Published: 09 Feb 2009

IronPort Systems

Network Intrusion Prevention Systems -- McAfee M-8000 Aces NSS's Performance Tests
sponsored by McAfee, Inc.
TEST RESULTS: In Q4 of 2008, NSS Labs performed comprehensive testing of the McAfee M-8000 Network IPS against our Network Intrusion Prevention Systems (NIPS) testing methodology v5.22. This report summarizes the results from the tests performed in our real-world test lab.
Posted: 09 Mar 2009 | Published: 09 Mar 2009

McAfee, Inc.

Security Appliances: New Strides in Preventing Intrusions
sponsored by IBM
WHITE PAPER: According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

IBM Security Event and Log Management Service
sponsored by IBM
SERVICE LISTING: With Security Event and Log Management Service, you can assemble the collective mindshare of your organization's network applications and operating systems along with disparate security technologies into one platform. You can archive, analyze, correlate and trend security and network events, while managing response and remediation workflow.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM
101 - 125 of 158 Matches Previous Page    3 4 5 6 7    Next Page
 
INTRUSION DETECTION DEFINITION (continued): …  to as scanning), which is a technology developed to assess the security of a computer system or network.Intrusion detection functions include: Monitoring and analyzing both user and system activities Analyzing system configurations and vulnerabilities Assessing system and file integrity Ability to recognize patterns typical of attacks Analysis of abnormal activity patterns Tracking user policy violationsID systems are being developed in response to the increasing number of attacks on major sites and networks, including those of the Pentagon, the White House, NATO, and the U.S. Defense Department. … 
Intrusion Detection definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement