IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Host Intrusion Prevention

RSS Feed   
Host Intrusion Prevention Reports
 
5 Steps to Making Better Security Decisions
sponsored by ThreatQuotient
WHITE PAPER: The goal of any cybersecurity program is to make better decisions faster. However, IT and security teams are often overwhelmed with the number of alerts requiring their attention. In this report, discover a 5-step process for making better security decisions and achieving a more effective response.
Posted: 18 Sep 2020 | Published: 18 Sep 2020

ThreatQuotient

4 Reasons to Add UBA to Your SIEM
sponsored by Splunk
WHITE PAPER: To combat threats, organizations traditionally have turned to SIEMs. However, more sophisticated use cases require a machine learning-powered solution. This is where user and entity behavior analytics (UEBA) can prove to be an invaluable addition to your SIEM. In this white paper, learn about 4 reasons to add UEBA to your SIEM.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk

2019 Crowdstrike Global Security Attitude Survey
sponsored by CrowdStrike
WHITE PAPER: In today’s threat landscape, cyberattacks are unavoidable. The best way to address threats is to establish an incident response plan. This report takes a closer look at the 1:10:60 rule for measuring the effectiveness of your response plan and explores the results of a recent study into the current state of cybersecurity capabilities.
Posted: 21 Feb 2020 | Published: 15 Nov 2019

CrowdStrike

Security Analytics for Threat Detection and Breach Resolution in 2019
sponsored by Gigamon
ANALYST REPORT: While there is no security silver bullet, security analytics is a great step forward for any organization to improve its ability to detect threats. In this white paper, explore the top 4 considerations for investigating a security analytics tool.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Gigamon

XDR: Extended Detection and Response
sponsored by Palo Alto Networks
WHITE PAPER: Extended detection & response (XDR) has emerged in the wake of a need to detect, investigate and respond to threats across all threat vectors in a company’s infrastructure (network, endpoint and cloud) rather than just one. Dive into this white paper to learn about XDR and how it uses integration and orchestration as defense.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Palo Alto Networks

Operationalizing Threat Intelligence Using Splunk Enterprise Security
sponsored by Splunk
WHITE PAPER: Explore the challenges and requirements of implementing high-coverage threat intelligence, and how your organization can achieve operational maturity.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Splunk

Intrusion Detection and Prevention: Decision Time
sponsored by SearchSecurity.com
EBOOK: Learn how to evaluate your potential vendor's IDS/IPS product and its ability to meet your specific business requirements.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SearchSecurity.com

Information Security ANZ March 2016
sponsored by TechTarget ANZ
EZINE: Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly
Posted: 03 Mar 2016 | Published: 03 Mar 2016


NSS Labs Network Intrusion Prevention System Product Analysis
sponsored by IBM
WHITE PAPER: This resource reveals the best-value features to look when making a network intrusion prevention system (IPS) by providing performance analysis of a top IPS solution.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

IBM

Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER: This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info