IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Host Intrusion Detection

RSS Feed   
Host Intrusion Detection Reports
 
Forrester 2019 TEI Report
sponsored by BlackBerry
WHITE PAPER: To protect endpoints, servers, and cloud workloads, CylancePROTECT and CylanceOPTICS provide an AI-driven threat prevention, detection, and response platform. In this Forrester Total Economic Impact study, examine the potential ROI enterprises realize after deploying these Cylance platforms.
Posted: 26 Jun 2019 | Published: 31 May 2019

BlackBerry

Targeted attacks: Preparation and Mitigation
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy.
Posted: 17 May 2013 | Published: 17 May 2013

SearchSecurity.com

Overcoming APT and Today’s Sophisticated Malware
sponsored by SearchSecurity.com
EGUIDE: In this e-guide from SearchSecurity.com, hear from experts as they discuss the dangers behind malware and APT attacks and offer effective virus detection techniques to help you address them.
Posted: 02 Apr 2012 | Published: 02 Apr 2012

SearchSecurity.com

XDR: Extended Detection and Response
sponsored by Palo Alto Networks
WHITE PAPER: Extended detection & response (XDR) has emerged in the wake of a need to detect, investigate and respond to threats across all threat vectors in a company’s infrastructure (network, endpoint and cloud) rather than just one. Dive into this white paper to learn about XDR and how it uses integration and orchestration as defense.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Palo Alto Networks

Are You Ready For Managed Detection and Response?
sponsored by Bitdefender
PRODUCT OVERVIEW: Managed Detection and Response (MDR) tools have emerged to ease the burden of high volumes of cyberthreats on security teams. But what exactly is MDR, what key gaps does it address, and how does it improve security? Read on to find out
Posted: 08 Feb 2021 | Published: 08 Feb 2021

Bitdefender

Is Your Platform Secure? Really?
sponsored by IBM
WHITE PAPER: This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

IBM

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It
sponsored by Google Apps
PRESENTATION TRANSCRIPT: Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents.
Posted: 19 Jan 2011 | Published: 19 Jan 2011

Google Apps

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Sophos

How to Prevent Cloud Cryptojacking Attacks on your Enterprise
sponsored by Cisco Umbrella
EGUIDE: Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.
Posted: 24 Aug 2018 | Published: 31 May 2018

Cisco Umbrella

E-Guide: Why attackers exploit multiple zero-day attacks and how to respond
sponsored by ESET
EGUIDE: The Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Symantec Corp. published an informative technical write-up that explains Stuxnet in detail and reports that around 100,000 systems have been infected.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

ESET
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences