IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Network IDS

RSS Feed    Add to Google    Add to My Yahoo!
Network IDS Reports
 
Comprehensive Protection from Today's Evolving Threats
sponsored by IBM
WHITE PAPER: Security should enhance network performance – not detract from it. Discover how an integrated security strategy can create comprehensive protection from today's evolving threats, without compromising the performance and reliability of your network.
Posted: 16 Feb 2016 | Published: 31 Mar 2013

IBM

Discover how to Optimize your SIEM
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: View this security classroom and learn how to enhance and extend your SIEM technology so it effectively supports incident response. Discover how to assess the variety of vendor products, what noncommercial sources to consider, what costs are involved, and how much heavy lifting is required.
Posted: 14 May 2014 | Premiered: 14 May 2014

SearchSecurity.com

Encrypted Traffic Management for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: In this e-book, you'll learn everything you need to know about keeping SSL-encrypted traffic both private and secure.
Posted: 11 Sep 2015 | Published: 11 Sep 2015

Blue Coat Systems

SenSage Security Intelligence
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: This white paper will teach you about a solution that can provide you with enterprise-wide protection and also provide you with decision support when it comes to security, risk management and compliance. So don't waste anytime and see why this real-time security solution could save your enterprise from a costly security breach.
Posted: 02 Jun 2011 | Published: 01 Feb 2010

Hexis Cyber Solutions Inc

Considerations for Integrating Intelligence into Security Operations
sponsored by Verisign, Inc.
WHITE PAPER: This white paper outlines four critical elements of cyber security intelligence that organizations must meet to ensure that the integration of the intelligence will help improve the safety and profitability of enterprises.
Posted: 18 Mar 2011 | Published: 18 Mar 2011

Verisign, Inc.

E-Guide: Why attackers exploit multiple zero-day attacks and how to respond
sponsored by ESET
EGUIDE: The Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Symantec Corp. published an informative technical write-up that explains Stuxnet in detail and reports that around 100,000 systems have been infected.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

ESET

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It
sponsored by Google Apps
PRESENTATION TRANSCRIPT: Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents.
Posted: 04 Apr 2011 | Published: 11 Jun 2010

Google Apps

Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

How To Secure Electronic Healthcare Records Effectively
sponsored by HP & Intel®
WHITE PAPER: This white paper highlights important ways to prevent intrusion and block attacks with a security approach that’s comprehensive, automated, and proactive. That way, your organization can ease the worry of facing hefty financial penalties in the face of a data breach.
Posted: 19 Jun 2012 | Published: 19 Jun 2012

HP & Intel®

Understanding and Selecting a File Activity Monitoring Solution
sponsored by Imperva
WHITE PAPER: Imagine having a tool to detect an administrator suddenly copying the entire directory containing the latest engineering plans, or a user with rights to a file outside their business unit accessing it for the first time in 3 years.
Posted: 20 May 2011 | Published: 16 May 2011

Imperva
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement