IT Systems  >   Business Systems  >   Security Systems  >  

Intrusion Detection Systems

RSS Feed   
ALSO CALLED: ID Systems, Intruder Detection System, IDS
DEFINITION: Systems designed to detect illegal entrance to a computer system.
Intrusion Detection Systems Reports
1 - 25 of 107 Matches Previous Page  |  Next Page
Armor File Integrity Monitoring (FIM)
sponsored by Armor
RESOURCE: Download this resource to learn about an additional layer of security that can protect your cloud, on-premise, hybrid, or hosted IT environment from threats.
Posted: 20 Nov 2018 | Published: 20 Nov 2018

Armor

Intrusion Detection Systems (IDS)
sponsored by Armor
WHITE PAPER: In this white paper, learn about 2 different Intrusion Detection Systems (IDS) that can analyze and correlate all security events, and trigger further investigation by a Security Operations Center when necessary.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Armor

SECaaS is Here: Everything you Need to Know
sponsored by Armor
WHITE PAPER: SECaaS, or security-as-a-service, can help organizations like yours, defend against advanced threats, detect intruders, and more. Read on to learn the details.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Armor

The Impact of Security Automation on Enterprise IT
sponsored by Juniper Networks
EGUIDE: The use of security automation and orchestration systems is on the rise, due to their ability to provide automatic responses to threats. Learn how SAO and automated incident response can benefit security in the cloud and in your enterprise.
Posted: 21 Sep 2018 | Published: 19 Sep 2018

Juniper Networks

7 Experts on Security Automation and Analytics
sponsored by Juniper Networks
EBOOK: In this e-book, 7 cybersecurity experts share their insights, strategies, and best practices surrounding security automation and analytics. Learn how their takeaways can help you overcome some of the complexities associated with security automation and analytics, today.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Juniper Networks

5 Top Recommendations for Effective Threat Detection
sponsored by Alert Logic
RESOURCE: If your organization is looking to improve the effectiveness of your threat detection program, uncover the top 5 recommendations for effective threat detection, today.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

Alert Logic

How to Prevent Cloud Cryptojacking Attacks on your Enterprise
sponsored by Cisco Umbrella
EGUIDE: Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.
Posted: 24 Aug 2018 | Published: 31 May 2018

Cisco Umbrella

The State of the SOC: An Enterprise Study on Threat Detection and Response
sponsored by Fidelis
RESEARCH CONTENT: Today, many Security Operations Centers (SOCs) are highly targeted by cybercriminals and their security analysts are being overwhelmed. Download this report to gain insights on the specific challenges faced in the SOC.
Posted: 21 Aug 2018 | Published: 31 Mar 2018

Fidelis

Capture the Flag with Deception Defenses
sponsored by Fidelis
WHITE PAPER: Deception — the use of decoys, traps, lures and other mechanisms — is quickly gaining the attention of organizations seeking an efficient post-breach detection technology. Learn how your organization can be a part of the cyberdeception trend to expose attacks as they happen.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

Fidelis

What's Hiding Within Your Metadata? How to Decode Your Network's Deepest and Darkest Secrets
sponsored by Fidelis
WHITE PAPER: Find out how metadata can transform the way you detect and investigate critical security threats in your network.
Posted: 20 Aug 2018 | Published: 20 Aug 2018

Fidelis

Ensure Data Protection with Fidelis Network
sponsored by Fidelis
VIDEO: To ensure an organization's digital assets are well protected, it is important to choose a full-featured network Data Loss Prevention (DLP) strategy that prevents a loss before it occurs. Download this webinar to find out how your organization can implement a strategy just like this.
Posted: 17 Aug 2018 | Premiered: 17 Aug 2018

Fidelis

Automate & Accelerate Your Security Operations
sponsored by Fidelis
EBOOK: Put your current threat detection and response strategy to the test and with a checklist of the 5 must have security automation capabilities to see if your enterprise is up to speed.
Posted: 17 Aug 2018 | Published: 17 Aug 2018

Fidelis

First Midwest Bank Uses Fidelis Deception to Detect and Respond to Security Anomalies
sponsored by Fidelis
CASE STUDY: Learn how a community bank used Fidelis Deception to detect and respond to incidents in their network, catching cybercriminals in the act.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Fidelis

Utilizing Deception for Effective Breach Detection
sponsored by Fidelis
WHITE PAPER: Learn how sophisticated deception software can cover all of the phases of the attack life cycle within your network, so you can catch cybercriminals in the act.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Fidelis

Fidelis Deception Demo - Product Overview
sponsored by Fidelis
VIDEO: Tune into this webinar to learn how your organization can use modern deception defenses to ensure an efficient and strong post-breach defense.
Posted: 14 Aug 2018 | Premiered: 14 Aug 2018

Fidelis

Breathe New Life Into Your IPS Strategy with Today's Evolved Options
sponsored by Fortinet, Inc.
WEBCAST: Intrusion Prevention Systems (IPS) play a critical role in network security by monitoring connections for malicious activities, but attacks are becoming more complex. Listen in on this webinar to learn what approach to IPS will help meet your unique network security needs.
Posted: 02 Jul 2018 | Premiered: Jul 2, 2018

Fortinet, Inc.

Improve IT Operational Response: Automate Your Communication, Collaboration, and Escalation Processes
sponsored by EverBridge Inc.
RESOURCE: In today's digital world, almost all companies experience IT incidents and events that threaten the availability of their mission-critical business applications or services. Access this resource to learn 5 keys to incident identification and 10 reasons why your IT incidents are not resolved faster.
Posted: 30 May 2018 | Published: 30 May 2018

EverBridge Inc.

Critical IT Events Demand a Faster Response Than Ever
sponsored by EverBridge Inc.
WHITE PAPER: An IDG survey finds that it takes most companies 25 to 39 minutes just to assemble an incident response team before it actually begins to respond. Access this white paper to uncover more key findings regarding incident response plans and how security automation can help.
Posted: 29 May 2018 | Published: 29 May 2018

EverBridge Inc.

Basefarm: Scaling Intrusion Detection Systems with Big Monitor Fabric
sponsored by Big Switch Networks
CASE STUDY: Find out how a leading hosting provider for critical business apps used a modern Network Packet Broker (NPB) and a SDN-based monitoring architecture to extend their monitoring and security services across multiple data centers.
Posted: 19 Oct 2018 | Published: 19 Oct 2018

Big Switch Networks

100G+ IDS/IPS Solutions that Enable Monitoring
sponsored by ADLINK Technology
RESOURCE: In this resource you can learn about traditional detection technologies, challenges of protecting web-based networks, user-based behavioral analysis to detect abnormal behavior, and more.
Posted: 09 Aug 2018 | Published: 09 Aug 2018

ADLINK Technology

Top 5 Log Sources You Should Be Ingesting but Probably Aren't
sponsored by ReliaQuest
WHITE PAPER: To maximize the benefits of logging efforts, organizations must evaluate and adapt existing processes to fit current needs and threats. Find out which logging sources your enterprise should be investing in.
Posted: 18 Jul 2018 | Published: 18 Jul 2018


Coordinate Network Security Tools for a Unified Defense
sponsored by Ixia - Keysight
WHITE PAPER: Find out how to extend the reach of security tools to access the entire network, coordinating intrusion prevention/detection systems (IPS/IDS), data loss prevention (DLP), and firewalls into a single, staunch line of defense.
Posted: 28 Jun 2018 | Published: 31 Dec 2017

Ixia - Keysight

Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations
sponsored by Websense, Inc.
WHITE PAPER: Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them.
Posted: 28 Aug 2017 | Published: 15 Sep 2011

Websense, Inc.

Tolly Report: IBM Security Network Protection XGS 7100 Evaluation
sponsored by IBM
RESOURCE: This report shows you the test results found by Tolly of IBM Security Network Protection XGS 7100 appliance. Learn how this next-generation intrusion prevention appliance faired in attack detection, blocking of various threat corpora, multi-protocol throughput and other tests.
Posted: 24 Oct 2016 | Published: 01 Feb 2016

IBM

NSS Labs Data Center IPS Test Report: IBM XGS 7100
sponsored by IBM
PRODUCT OVERVIEW: This report represents the independent test results of IBM Security Network Protection XGS 7100 v5.3.2.1 conducted by NSS Labs. Learn how IBM's Data Center Intrusion Prevention System (DCIPS) faired against NSS Labs' tests and how it stacks up against other DCIPS products.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

IBM
1 - 25 of 107 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement