IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Protection

RSS Feed    Add to Google    Add to My Yahoo!
Intrusion Protection Reports
 
The real need for distributed denial-of-service protection: How to stop DDoS attacks
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses the immediate need for DDoS protection services and what you put at risk by not protecting your organization today. Uncover how these attacks work, the damage they can cause and best practices to stop them.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

SearchSecurity.com

NSS Labs Network Intrusion Prevention System Product Analysis
sponsored by IBM
WHITE PAPER: This resource reveals the best-value features to look when making a network intrusion prevention system (IPS) by providing performance analysis of a top IPS solution.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

IBM

Getting Ahead of Advanced Threats - Achieving Intelligence-Driven Security
sponsored by RSA
WHITE PAPER: With today’s advancing threat landscape, traditional approaches to information security are no longer enough. Instead organizations need to take an intelligence-driven approach to more effectively detect and mitigate cyber attacks. View now to explore the growing need for intelligence-driven security and uncover a 6-step approach for achieving it.
Posted: 07 Mar 2012 | Published: 07 Mar 2012

RSA

September Information Security Magazine
sponsored by SearchSecurity.com
EZINE: Industry experts explore key developments that define next-generation firewalls from application awareness to domain-reputation-management, intrusion prevention techniques, and protecting virtual machines. Also uncover the latest global risk assessment that predicts investments in security will finally lead spending in years to come.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

SearchSecurity.com

Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER: This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013

IBM

A pragmatic approach to security - How to stay secure in 2012
sponsored by Dell SecureWorks
WHITE PAPER: While it can be tempting to simply buy new security technologies to solve your problems, they are unlikely to help if the basics of an effective security practice are not in place. In this white paper, discover how your organisation can apply pragmatism to IT security and do more with what you already have.
Posted: 18 Nov 2011 | Published: 18 Nov 2011

Dell SecureWorks

Inside IT: Stopping Security Threats in an Ever-Changing Landscape
sponsored by Intel
PODCAST: In this podcast, Intel's CISO Malcolm Harkins discusses the ever-changing security and threat landscapes and explains why adding advanced protection to your current systems is crucial to staying secure.
Posted: 27 Dec 2012 | Premiered: Dec 27, 2012

Intel

FortiGate DoS Protection - Block Malicious Traffic Before It Affects Critical Applications and Systems
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization’s network from being used to attack another organization.
Posted: 01 Aug 2011 | Published: 29 Jul 2011

Fortinet, Inc.

Magic Quadrant for Intrusion Prevention Systems
sponsored by Sourcefire
WHITE PAPER: This guide explores one company's intrusion prevention system and how it can integrate smoothly with your next-generation firewalls to ensure top-notch security.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire

E-Guide: Building Risk Resilience in the Threat Landscape
sponsored by CA Technologies.
EGUIDE: This expert e-guide explores how next-generation firewalls (NGFW) can overcome the limitations of traditional firewall solutions. Read on to discover key features, functions, and benefits that NGFWs can offer your organization. Also inside, find key tips for building risk resilience.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement