IT Systems  >   Business Systems  >   Security Systems  >  

Intrusion Prevention Systems

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IPS
DEFINITION: An intrusion prevention system is any device which exercises access control to protect computers from exploitation. Intrusion prevention technology is considered by some to be an extension of intrusion detection (IDS) technology, but it is actually another form of access control, like an application layer firewall.
Intrusion Prevention SystemsReports
76 - 100 of 133 Matches Previous Page  | Next Page
The real need for distributed denial-of-service protection: How to stop DDoS attacks
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses the immediate need for DDoS protection services and what you put at risk by not protecting your organization today. Uncover how these attacks work, the damage they can cause and best practices to stop them.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

SearchSecurity.com

How to Effectively Secure Electronic Health Records
sponsored by HP and Intel
WHITE PAPER: In the ongoing effort to reach HIPPA Electronic Medical Record (EMR) compliance standards, one of the biggest concerns is security. Download this whitepaper to see how to develop a blanket of security for patients and your reputation through leveraging best practices for automated threat protection!
Posted: 29 Feb 2012 | Published: 29 Feb 2012

HP and Intel

Protecting the Network Perimeter: Controlling what gets through—into and out of your organization
sponsored by McAfee.
WHITE PAPER: The traffic allowed to flow through the network perimeter – both good and bad – can determine the success or potential downfall of an organisation. View this paper to explore how McAfee can help protect network perimeters with a solution that enables organisations to easily, effectively, and securely manage traffic flow.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

McAfee.

McAfee Leads Criteria for Next-Generation IPS
sponsored by McAfee.
WHITE PAPER: Discover how to mitigate today's increasingly sophisticated attacks with next-generation intrusion prevention (IPS). View now to explore how McAfee Network Security Platform 7 and an integrated network security framework can help deliver new levels of protection.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

McAfee.

Stop strategies for preventing network intrusions
sponsored by Dell SecureWorks
EGUIDE: This expert E-Guide will provide you with the steps, processes, and prevention methods to maintain a secure network within your industry.
Posted: 06 Dec 2011 | Published: 05 Dec 2011

Dell SecureWorks

WGBH: WGBH Increases Security By '300 percent' with Perimeter as a Partner
sponsored by Perimeter eSecurity
CASE STUDY: Public broadcaster, WGBH, needed new security measures to be put in place so that compliance requirements could be met. View this case study to learn how Perimeter's technology, people, and experience inspired greater confidence in their decision to choose Perimeter.
Posted: 03 Nov 2011 | Published: 03 Nov 2011

Perimeter eSecurity

Attack Mitigation System
sponsored by Radware
WHITE PAPER: Radware’s Attack Mitigation System (AMS) is a real-time network and application attack mitigation solution that protects the application infrastructure against network and application downtime, application vulnerability exploitation, malware spread, information theft, web service attacks and web defacement. View now to learn more.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Radware

Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations
sponsored by Websense, Inc.
WHITE PAPER: Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

Websense, Inc.

Presentation Transcript: Incident Response - Are you prepared?
sponsored by Dell SecureWorks UK
PRESENTATION TRANSCRIPT: In this presentation transcript, Lee Lawson, Head of Response Service for Dell SecureWorks EMEA outlines a successful Incident Response approach and best practices for your organisation.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

Dell SecureWorks UK

Presentation Transcript: Integrating Virtual-Aware Security Technologies
sponsored by Intel
PRESENTATION TRANSCRIPT: There are a growing number of virtual aware security technologies that promise to help you keep data moving between virtual machines safe. This transcript is intended to help you evaluate the technologies and how best to integrate them into your existing network topology for a complete view of activity, vulnerabilities and remediation options.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

Intel

Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems
sponsored by Dell SecureWorks UK
PRESENTATION TRANSCRIPT: View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks UK

Understanding Advanced Virtualization Security Practices
sponsored by Intel
EBOOK: SearchCloudSecurity.com presents a comprehensive guide to virtualization security. Our experts help you assess and prioritize the risks and threats to virtual environments. You’ll learn what steps you must take to handle secure multitenancy, hypervisor threats and hypervisor protection, and data management service security.
Posted: 19 Aug 2011 | Published: 18 Aug 2011

Intel

Magic Quadrant for Network Intrusion Prevention Systems
sponsored by McAfee.
ANALYST REPORT: This research paper analyzes the market, evolution, and use cases of network-based IPS. View now to explore IPS vendors in the market, and discover where they rank in Gartner’s Magic Quadrant.
Posted: 15 Aug 2011 | Published: 06 Dec 2010

McAfee.

iSensor specifications
sponsored by Dell, Inc.
DATA SHEET: Organizations need advanced security technology, strong security expertise and 24x7 vigilance to safeguard their networks and IT systems. This data sheet offers an overview and specifications of Dell SecureWorks’ proprietary network intrusion prevention appliance, iSensor. Learn about its key features and how it can protect your networks.
Posted: 18 May 2011 | Published: 18 May 2011

Dell, Inc.

Intrusion prevention service with iSensor
sponsored by Dell, Inc.
WHITE PAPER: Anti-virus and firewalls technologies are not enough to protect your business from emerging threats. Discover an advanced security solution that offers intrusion prevention services to help monitor your network and deliver exceptional threat protection. Read this paper to learn how to stay ahead of the latest threats and secure your networks.
Posted: 18 May 2011 | Published: 18 May 2011

Dell, Inc.

Case Study: A Large Multi–Program National Laboratory Stays Ahead of Next-Generation Malware By Deploying FireEye Web Malware Protection System
sponsored by FireEye
CASE STUDY: This case study will outline how one company trusted FireEye's Web Malware Protection System to guard their highly sensitive information and how well the system performed. You will also learn about the features the security solutions contains and how it could be perfect for your business.  
Posted: 10 May 2011 | Published: 10 May 2011

FireEye

CISO Guide to Next Generation Threats
sponsored by FireEye
WHITE PAPER: This white paper will tell you about a new security solutions and the need to your business to update it's security solutions to a Next-Generation security system.
Posted: 09 May 2011 | Published: 09 May 2011

FireEye

Monitoring network traffic: Appliance placement and choke points
sponsored by Sourcefire
EGUIDE: It's important for all organizations to monitor network traffic in order to track network performance over time. This expert tip highlights the best points for monitoring traffic flow on a network and why.
Posted: 04 May 2011 | Published: 04 May 2011

Sourcefire

E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by IBM
EGUIDE: In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM

E-Book: Technical Guide on Network Security Monitoring
sponsored by AVG Technologies USA, Inc.
EBOOK: Your organization’s network is more than a collection of pipes through which traffic flows: it’s your business’ fundamental IT architecture. Your security devices keep a watchful eye on traffic and systems, and maintain the integrity of your data and systems. Check out this guide to network security monitoring from SearchMidmarketSecurity.com.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

AVG Technologies USA, Inc.

Deep Security 7.5
sponsored by Trend Micro, Inc.
VIDEO: Protect your virtualized environment by learning what Deep Security 7.5 can do for you. Watch this video to learn so much more about Deep Security 7.5.
Posted: 15 Sep 2010 | Premiered: 15 Sep 2010

Trend Micro, Inc.

E-Book: Technical Guide on Network Security Monitoring
sponsored by SearchMidMarketSecurity
EBOOK: SearchMidmarketSecurity.com presents a comprehensive guide to network security monitoring. Our experts cover all the angles with authoritative technical advice on: network security management; integrity monitoring; security device testing; intrusion prevention buying criteria; and how to prepare for your annual network audit.
Posted: 17 May 2010 | Published: 17 May 2010

SearchMidMarketSecurity

Generating New Revenue Streams and Increasing Network Security: Dynamic Application Awareness and Intrusion Prevention System
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper examines ways in which dynamic application awareness and intrusion prevention system (IPS) software solutions enable service providers to increase revenue while expanding service flexibility, richness, and reach. The paper then describes the technologies behind these advanced solutions. Read on to learn more.
Posted: 10 Feb 2010 | Published: 10 Dec 2009

Juniper Networks, Inc.

CORE IMPACT Pro V10
sponsored by Core Security Technologies
PRODUCT DEMO: Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
Posted: 30 Dec 2009 | Premiered: 30 Dec 2009

Core Security Technologies

The Total Economic Impact Of McAfee’s Network Security Platform’s Intrusion Prevention System: Multicompany Analysis
sponsored by McAfee, Inc.
ANALYST REPORT: This June 2009 study examines the financial impact and potential return on investment (ROI) for McAfee Network Security Platform intrusion prevention system (formerly McAfee IntruShield®), using Adena Health System as a case study.
Posted: 23 Nov 2009 | Published: 29 Aug 2009

McAfee, Inc.
76 - 100 of 133 Matches Previous Page    2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement