IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Protection

RSS Feed   
Intrusion Protection White Papers (View All Report Types)
 
Beginner's Guide to Open Source Intrusion Detection Tools
sponsored by AT&T Cybersecurity
WHITE PAPER: Threat and intrusion detection have become a top priority in cybersecurity, making it more important than ever. If you aren't already running an intrusion detection system (IDS) in your network, you should start now. In this white paper, explore different IDS tools to determine which would be the best fit for your organization.
Posted: 10 May 2019 | Published: 10 May 2019

AT&T Cybersecurity

How To Identify Compromised Devices With Certainty
sponsored by HelpSystems
WHITE PAPER: It is important for organizations to protect their devices from any threats. However, many security tools can't identify which alerts are important. In this white paper, learn how to avoid serious damage by focusing on swift detection and effective response.
Posted: 19 Jul 2019 | Published: 19 Jul 2019

HelpSystems

The Seven Essential Capabilities of an Analytics-Driven SIEM
sponsored by Splunk
WHITE PAPER: There is no shortage of options for storing data. Collecting all security relevant data and turning all that data into actionable intelligence, however, is a whole other matter. An analytics-driven SIEM allows IT to monitor threats and respond quickly to incidents. In this white paper, discover 7 essential capabilities of an analytics-driven SIEM.
Posted: 19 Feb 2019 | Published: 19 Feb 2019

Splunk

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Supporting the Zero Trust Model of Information Security
sponsored by IBM
WHITE PAPER: This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Learn about this security strategy's 3 main concepts, and discover how the intrusion prevention system (IPS) can be used to fulfill this model.
Posted: 20 Feb 2014 | Published: 30 Sep 2013

IBM

Drive business value with innovation for security defense
sponsored by IBM
WHITE PAPER: This white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

Intrusion prevention service with iSensor
sponsored by DellEMC and Intel®
WHITE PAPER: Anti-virus and firewalls technologies are not enough to protect your business from emerging threats. Discover an advanced security solution that offers intrusion prevention services to help monitor your network and deliver exceptional threat protection. Read this paper to learn how to stay ahead of the latest threats and secure your networks.
Posted: 18 May 2011 | Published: 18 May 2011

DellEMC and Intel®

Detecting and Preventing Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: Continue on to this important whitepaper now to learn how to properly instrument and monitor for anomalous activity. Also discover a security intelligence platform that can directly monitor endpoints and much more.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

Practitioner's Guide to Establishing an SOC
sponsored by AT&T Cybersecurity
WHITE PAPER: This white paper provides an overview of how to evaluate the security controls needed to establish a Security Operation Center (SOC), along with what data a SOC needs to quickly detect and respond to a breach.
Posted: 12 Jul 2013 | Published: 09 Apr 2013

AT&T Cybersecurity

Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER: This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement