IT Systems  >   Business Systems  >   Security Systems  >   Intrusion Detection Systems  >  

Host-Based Intrusion Detection Systems (HIDS)

RSS Feed   
DEFINITION: Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet.
Host-Based Intrusion Detection Systems (HIDS) Reports
51 - 75 of 1434 Matches Previous Page  |  Next Page
A Buyer’s Guide to Log Analysis
sponsored by LogicMonitor
WHITE PAPER: Download this in-depth guide to uncover the top three considerations when evaluating a log analysis platform. Plus, the road to log intelligence and how to put it to work.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

LogicMonitor

A Computer Weekly Buyer's Guide to Hyperautomation and Bots
sponsored by ComputerWeekly.com
EGUIDE: The advantages of bots are only multiplying for businesses across the globe. In this 15-page buyer's guide, Computer Weekly looks at how robotic process automation is evolving, the benefits it brings for coders and the ways artificial intelligence can enhance customer service.
Posted: 30 Apr 2021 | Published: 30 Apr 2021

ComputerWeekly.com

A Fast Path Guide to Success
sponsored by Appsian
RESOURCE: For financial risk management and security leaders, protecting legacy ERP data in the age of remote work is shaping up to be a significant challenge in the new year. Read this blog post to learn more about the Appsian Security Platform and how its features are designed to identify remote security risks and protect ERP data.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Appsian

A Guide to Cyber Risk
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

A Guide To Mitigating Risk Of Insider Threats
sponsored by Microsoft
RESOURCE: Insider threats have been a growing issue – both in terms of volume and cost – made even more disruptive thanks to the 2020 pandemic. This article provides a comprehensive guide to managing insider threats in the remote work era – read on to get started.
Posted: 16 Dec 2020 | Published: 16 Dec 2020

Microsoft

A Mandate to Execute a New Data Security Strategy
sponsored by Ionic Security
VIDEO: In this video panel, join Ionic Security experts as they discuss the age of rapidly increasing digital threats, the importance of a data-centric approach to security, the impacts of GDPR, and more.
Posted: 27 Feb 2020 | Premiered: 27 Feb 2020

Ionic Security

A practical approach to ITIL 4 adoption 10 mistakes to avoid and 10 steps to follow
sponsored by ServiceNow
EBOOK: Many common mistakes in an ITIL adoption start with undereducated IT professionals who do not fully understand what ITIL is and how it should be used. Open up this eBook to take a closer look at 10 mistakes to avoid, plus, 10 planning and implementation steps to follow for a seamless ITIL 4 adoption.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

ServiceNow

A PROVEN APPROACH TO CLOUD WORKLOAD SECURITY
sponsored by CrowdStrike
WHITE PAPER: As a cybersecurity company that has built one of the biggest cloud architectures in the world, CrowdStrike has gained an exceptional vantage point and garnered unique experience on what it takes to secure cloud workloads. Read this white paper to uncover CrowdStrike’s lessons learned, observational insights and expertise.
Posted: 12 Aug 2020 | Published: 12 Aug 2020

CrowdStrike

A Security Engineer’s Nightmare
sponsored by Cribl.io
WHITE PAPER: For security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Cribl is helping security engineers log information and incidents so they can focus their efforts on more important tasks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Cribl.io

A simple and effective security layer for digital communications
sponsored by Zivver
CASE STUDY: In this case study, follow the journey of Agency DNA, a business management consultancy, as they partner with Zivver to establish a simple and effective data protection program that addresses key challenges related to compliance, user experience, and more – read on to unlock the full story.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Zivver

A Brazilian company adopts IBM System z to handle rapid business growth
sponsored by IBM
WEBCAST: This on-demand video case study explains how Sicoob, Brazil's largest cooperative credit system, achieved high performance and scalability by investing in the right server platform, allowing the company to accommodate business growth.
Posted: 21 Feb 2014 | Premiered: May 29, 2013

IBM

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

A CIO's Top Priority
sponsored by Rainforest QA Inc.
EGUIDE: Chances are that you see your role as CIO differently than everyone else in the company. This e-guide will help you gain perspective on what your organization is looking for you to accomplish and how to rearrange your priorities accordingly.
Posted: 05 Sep 2017 | Published: 30 Aug 2017

Rainforest QA Inc.

A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER: This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012

Vormetric

A Comprehensive Guide to the Latest Threat Detection Technologies
sponsored by SearchSecurity.com
WHITE PAPER: This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com

A free Demonstration of Panda Cloud Systems Management
sponsored by Panda Security
SOFTWARE DEMO: Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

Panda Security

A Guide to Password Use in WebSphere Application Server
sponsored by Global Knowledge
WHITE PAPER: Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge

A Guide to SIEM Platforms, Benefits and Features
sponsored by SearchSecurity.com
EZINE: SIEM systems enable organizations to centralize indecent response, detection and handling, as well as data logging for compliance. This e-guide is a collection of resources highlighting SIEM benefits, criteria and tools. Read on to evaluate which SIEM system is right for you.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

SearchSecurity.com

A Hybrid IT Approach to Virtualization & DevOps Management
sponsored by Red Hat
EGUIDE: Here, experts illustrate the evolution of multi-use virtualization tools, and you'll discover how to benefit from a hybrid approach that combines physical, virtual, and application visibility with automation and deep infrastructure analysis. Read on to also learn how DevOps is reshaping IT vendors' offerings.
Posted: 02 Feb 2017 | Published: 31 Jan 2017

Red Hat

A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls
sponsored by Sophos
WHITE PAPER: Unified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM system.
Posted: 20 Dec 2013 | Published: 30 Nov 2013

Sophos

A Manifesto for Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Symantec Corporation

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

A Roadmap for Big Data in Security Analytics
sponsored by EMC Corporation
WHITE PAPER: Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

EMC Corporation
51 - 75 of 1434 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences