IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Network Intrusion Management

RSS Feed    Add to Google    Add to My Yahoo!
Network Intrusion ManagementReports
 
Get Ready to Halt Cyber Attacks With IPS In Place
sponsored by HP and Intel
CASE STUDY: This case study highlights an intrusion prevention system (IPS) solution that is designed to secure network and critical data with intelligent and adaptive security measures.
Posted: 15 Aug 2014 | Published: 30 Jun 2014

HP and Intel

Real-time Monitoring, Alerts, and Analysis Offer In-Depth Security
sponsored by Dell SecureWorks UK
CASE STUDY: In this case study explore how implementing Dell SecureWorks enabled Pharmaceutical firm, ProStrakan, to enhance its security and compliance posture by providing 24/7 monitoring, instant alerts and in-depth threat analysis.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Dell SecureWorks UK

Detecting and Preventing Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

LogRhythm, Inc.

Securing the Small Business Network
sponsored by Dell Software
WHITE PAPER: This ebook examines eight network security challenges that small businesses face today, and offers easy and effective solutions. Dell SonicWALL offers the comprehensive protection your small business needs, priced within your budget.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

A Guide to Big Data Security Analytics and SIEM Strategies
sponsored by LogRhythm, Inc.
WHITE PAPER: Explore the current SIEM tools and capabilities today and uncover how new improvements in SIEM can help boost your defenses in today's threat-filled world.
Posted: 31 Jan 2013 | Published: 31 Dec 2012

LogRhythm, Inc.

Making a Business Case for Fraud Prevention Technology
sponsored by IBM
WHITE PAPER: This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

IBM

E-Guide: Next-Gen Firewall vs. the Competition - Which is Better?
sponsored by Dell SonicWALL
EGUIDE: Uncover the best strategies for network protection by consulting this informative e-guide for an evaluation of next-generation firewalls (NGFWs) against other network security solutions, including unified threat management products and intrusion prevention systems.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

Dell SonicWALL

A Buyer's Guide to Endpoint Protection Platforms
sponsored by McAfee, Inc.
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

McAfee, Inc.

HP TippingPoint: Next Generation Intrusion Prevention System
sponsored by Hewlett-Packard Company
WHITE PAPER: Consult this informative white paper to learn more about how intrusion prevention systems can improve the security in your business. With this security solution you can stop advanced and targeted attacks before they damage your company.
Posted: 27 Aug 2012 | Published: 27 Aug 2012

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement