IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Network Intrusion Management

RSS Feed    Add to Google    Add to My Yahoo!
Network Intrusion ManagementReports
 
A Guide to Big Data Security Analytics and SIEM Strategies
sponsored by LogRhythm, Inc.
WHITE PAPER: Explore the current SIEM tools and capabilities today and uncover how new improvements in SIEM can help boost your defenses in today's threat-filled world.
Posted: 31 Jan 2013 | Published: 31 Dec 2012

LogRhythm, Inc.

What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications
sponsored by Imperva
WHITE PAPER: Read this white paper to unveil the top 6 recommended features for Web application security that next-generation firewalls and an intrusion prevention system (IPS) often miss.
Posted: 21 Feb 2014 | Published: 31 Dec 2013

Imperva

Security Value Analysis: Breach Detection Systems
sponsored by Fortinet, Inc.
WHITE PAPER: This one-page infographic takes a look at the correlation between value and protection for some of the top breach detection systems in the marketplace.
Posted: 09 Apr 2014 | Published: 09 Apr 2014

Fortinet, Inc.

Understanding Cloud-Specific Security Technologies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

IT Security Purchasing Intentions 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

Targeted attacks: Preparation and Mitigation
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy.
Posted: 17 May 2013 | Published: 17 May 2013

SearchSecurity.com

McAfee Leads Criteria for Next-Generation IPS
sponsored by McAfee.
WHITE PAPER: Discover how to mitigate today's increasingly sophisticated attacks with next-generation intrusion prevention (IPS). View now to explore how McAfee Network Security Platform 7 and an integrated network security framework can help deliver new levels of protection.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

McAfee.

Protecting the Network Perimeter: Controlling what gets through—into and out of your organization
sponsored by McAfee.
WHITE PAPER: The traffic allowed to flow through the network perimeter – both good and bad – can determine the success or potential downfall of an organisation. View this paper to explore how McAfee can help protect network perimeters with a solution that enables organisations to easily, effectively, and securely manage traffic flow.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

McAfee.

Security considerations for small and medium-sized enterprises (SMEs)
sponsored by GFI Software
WHITE PAPER: SMEs are just as vulnerable to security breaches as any other enterprise, but often times they consider security only as an afterthought. View this paper to explore key security challenges for SMEs and the necessary tools and policies for effective protection.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

GFI Software

Next Generation Firewalls: Assessing the Business/Technology Issue
sponsored by Dell SonicWALL
EGUIDE: In the first of SearchSecurity.com's three-part guide on selecting Next Generation Firewall products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of Next Generation Firewall solutions.
Posted: 19 Nov 2012 | Published: 14 Nov 2012

Dell SonicWALL
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement