IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Host Intrusion Prevention

RSS Feed   
Host Intrusion Prevention Reports
 
UCAS Secures Millions of University Applications With Splunk Enterprise Security Analytics
sponsored by Splunk
CASE STUDY: The Universities and Colleges Admissions Service (UCAS) is the U.K.'s shared admissions service for higher education. They host a complex flow of sensitive, personal data. Therefore, it is important that they deliver faultless security assurance. In this case study, learn how UCAS was able to meet these security needs by adopting Splunk.
Posted: 18 Feb 2019 | Published: 18 Feb 2019

Splunk

Real-Time Automated Endpoint Security
sponsored by enSilo
DATA SHEET: enSilo's real-time automated endpoint security has a mission to deliver comprehensive real-time endpoint protection offering post- and pre-infection protection against advance malware. In this resource, learn more about the benefits of enSilo.
Posted: 22 May 2019 | Published: 22 May 2019


Utilizing Deception for Effective Breach Detection
sponsored by Fidelis
WHITE PAPER: Learn how sophisticated deception software can cover all of the phases of the attack life cycle within your network, so you can catch cybercriminals in the act.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Fidelis

Security Operations Center: Build It Or Buy It
sponsored by Armor
WHITE PAPER: Organizations have come to realize the only way to protect their networks around the clock is with a security operations center (SOC). This white paper can help you decide whether to build or buy a SOC by exploring the staffing, technology, and costs required to operate a successful SOC.
Posted: 02 May 2019 | Published: 30 Nov 2018

Armor

How to Properly Secure Your Organization: Evolving Your Threat-Detection Techniques and Endpoint Security Strategy
sponsored by Bit9, Inc.
EGUIDE: Learn the steps of evolving your endpoint security strategy as well as the benefits and challenges that can arise when utilizing threat detection products.
Posted: 23 Oct 2013 | Published: 23 Oct 2013

Bit9, Inc.

Threat Detection (Antivirus Intrusion Prevention)
sponsored by SearchSecurity.com
EBOOK: Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Intrusion Detection and Protection: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK: Learn how IDS/IPS help you thwart attacks and mitigate post-attack damage.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SearchSecurity.com

NSS Labs 2013 Network IPS Comparative Analysis
sponsored by IBM
WHITE PAPER: This resource explores the necessary elements to focus on when deploying a successful intrusion prevention system (IPS).
Posted: 14 Apr 2014 | Published: 31 Dec 2013

IBM

September Information Security Magazine
sponsored by SearchSecurity.com
EZINE: Industry experts explore key developments that define next-generation firewalls from application awareness to domain-reputation-management, intrusion prevention techniques, and protecting virtual machines. Also uncover the latest global risk assessment that predicts investments in security will finally lead spending in years to come.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

SearchSecurity.com

Manage Data Security and Application Threats with a Multi-Tiered Approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement