IT Systems  >   Business Systems  >   Security Systems  >  

Intrusion Detection Systems

RSS Feed   
ALSO CALLED: ID Systems, Intruder Detection System, IDS
DEFINITION: Systems designed to detect illegal entrance to a computer system.
Intrusion Detection Systems Reports
1 - 25 of 124 Matches Previous Page  |  Next Page
Threat Intelligence Executive Report
sponsored by Dell SecureWorks
WHITE PAPER: The Secureworks Counter Threat Unit (CTU) regularly conducts research and releases reports related to current developments in threat behaviors and cybersecurity trends. In their most recent Threat Intelligence report, analyze March and April 2020 to discover how COVID-19 shaped the threat landscape, workplace trends, and more.
Posted: 10 Aug 2020 | Published: 10 Aug 2020

Dell SecureWorks

Empower Security Analysts Through Guided EDR Investigation
sponsored by McAfee
WHITE PAPER: Today’s EDR solutions are often better tailored to larger enterprises – leaving most security teams feeling overwhelmed and at risk. This Forrester report takes a closer look at an emerging EDR trend – guided investigation – which leverages automation to enable greater security, efficiency and scale. Read on to see what Forrester has to say.
Posted: 10 Aug 2020 | Published: 31 May 2019

McAfee

CipherTrust Data Discovery and Classification from Thales
sponsored by Thales
VIDEO: To meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.
Posted: 10 Aug 2020 | Premiered: 23 Mar 2020

Thales

Stopping Zero Days at The Speed of Digital
sponsored by Checkpoint Software Technologies
EBOOK: Most organizations are ill-equipped to handle the threat of zero-day cyberattacks. This e-book, Stopping Zero Days at The Speed of Digital, highlights 3 best practices that can help organizations better identity and mitigate these threats without compromising productivity – read on to get started.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

Checkpoint Software Technologies

SIG - Axcess Financial Customer Story
sponsored by Cisco Umbrella
CASE STUDY: In this case study, following the journey of Axcess Financial as they partner with Cisco to address issues they were facing related to incident detection, response and remediation. Read on to learn how they overcame these challenges and the benefits of their partnership.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

Cisco Umbrella

The Role of Insider Threat Management Software Platforms
sponsored by Proofpoint
EBOOK: As workplace trends and cyberthreats evolve, so too should the methods used to mitigate risk and ensure user protection. This e-book takes a closer look at the growing risk of insider threats and explores the capabilities of the ObserveIT platform, Proofpoint’s insider threat management software platform.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Proofpoint

Insider Threat Management and Cybersecurity Tools
sponsored by Proofpoint
EBOOK: The traditional notion of a perimeter is a thing of the past, people are the new perimeter. In this e-book, discover the tools and tactics organizations are using to defend against insider threats – evaluating the strengths and weaknesses of each approach and underlining the importance of people-centric security.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Proofpoint

An Overview of Insider Threat Management
sponsored by Proofpoint
EBOOK: The average cost of an insider-caused cybersecurity incident has grown to $11.45 million – and these attacks are becoming more frequent, too. In this e-book, enhance your understanding of insider threats by looking at industry specific concerns, common use cases, the increasingly popular people-centric approach, and more.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Proofpoint

A Guide to Setting Up Your Insider Threat Management Program
sponsored by Proofpoint
EBOOK: In this past 2 years, the average cost of insider threats grew to a devastating $11.45 million per incident (the frequency also increased too). Download this e-book to learn more about the varying types of insider threats, how to set up an insider threat management program, best practices, and more.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Proofpoint

Loading DLLs for Illicit Profit: A Story About a Metamorfo Distribution Campaign
sponsored by Bitdefender
WHITE PAPER: Dynamic-link libraries (DLLs) are on-ramps into a network that tend to be overlooked. Hackers can hijack an organization’s DLLs leaving valuable company data vulnerable to attack and theft. Read this white paper for a closer look at how cybercriminals hack DLLs for illicit profit and how you may be able to prevent these criminals.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

Bitdefender

Dynamic Data Protection
sponsored by Forcepoint
PRODUCT OVERVIEW: The following solution brief provides an inside look into Forcepoint Dynamic Data Protection, which combines behavior analytics with data protection capabilities to enable your organization to prioritize high-risk activity and automate policies – ensuring security without sacrificing productivity. Read on for an overview of the key features.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Forcepoint

Threat Intelligence Driven Detect and Response Operations
sponsored by Bitdefender
WEBCAST: Cyber threat intelligence (CTI) is both a product and a process designed to equip users with actionable information regarding a threat, enabling to mitigate the impact. In this SANS webcast, join distinguished security experts as they further discuss incorporating CTI into your organizations threat detection, hunting and response program.
Posted: 23 Jul 2020 | Premiered: Nov 30, 2019

Bitdefender

Faster Threat Detection and Response with Data Science and Next-gen SIEM
sponsored by Cysiv
WHITE PAPER: Download this white paper for a closer look at Cysiv’s data science-driven approach to more quickly, effectively and efficiently investigate cyber threats within their next-gen security information and event management (SIEM) platform.
Posted: 17 Jul 2020 | Published: 22 Apr 2020

Cysiv

DataVisor Scales Multicloud Security & Compliance for Customers
sponsored by Lacework
CASE STUDY: In this case study, discover how DataVisor, a rapidly growing organization that offers AI-based fraud detection and risk management, was able to ensure security, productivity and compliance across their expanding multicloud environment.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

Lacework

Unlock the Value of Your AWS CloudTrail Data
sponsored by Lacework
PRODUCT OVERVIEW: As business environments become increasingly complex, threat detection becomes a daunting task. To help overburdened security analysts, Lacework designed a platform to detect anomalies and potential threats within your network, providing you with contextual behavioral analytics. Download this solution brief to learn more about the platform.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Lacework

Light Agent or Agentless
sponsored by Kaspersky Lab
PRODUCT OVERVIEW: Virtual environments require a cybersecurity approach that goes beyond the scope of traditional systems. Download this features guide for an in-depth look at Kaspersky Security for Virtualization, an advanced network protection offering designed to improve threat detection speeds while offering the scalability needed for modern environments.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

Kaspersky Lab

Transforming Detection and Response: A SANS Review of Cortex XDR
sponsored by Palo Alto Networks
ANALYST REPORT: Cortex XDR is a platform designed to help organizations detect and respond to threats. It brings multiple data sources together to assist analysts in performing enterprise investigations. This SANS report found that organizations looking for a holistic view of their environment would benefit from the correlation/response capabilities of Cortex XDR.
Posted: 29 Jun 2020 | Published: 30 Apr 2020

Palo Alto Networks

Managed Detection and Response (MDR+)
sponsored by BlueVoyant
PRODUCT OVERVIEW: As threat detection, isolation and mitigation becomes increasingly complex, organizations look to third-party vendors for managed detection and response tools and capabilities. This solution brief highlights the key capabilities of at BlueVoyant’s Managed Detection and Response (MDR+) for Microsoft Defender ATP – read on to unlock the features.
Posted: 25 Jun 2020 | Published: 23 Jun 2020

BlueVoyant

MITRE ATT&CK Framework Q&A with Forrester Research
sponsored by Capsule8
WHITE PAPER: In response to the growing popularity and adoption of the MITRE ATT&CK framework, John Zelonis, principal analyst at Forrester Research, provides answers to commonly asked questions and offers further insight into the MITRE ATT&CK framework, including: Who should use the framwork, where priorities should begin & how it falls short.
Posted: 25 Jun 2020 | Published: 24 Jun 2020


Artificial Intelligence in Cybersecurity
sponsored by Spin Tech
VIDEO: Given the nature of artificial intelligence, it’s no surprise to see organizations integrating AI capabilities into their cybersecurity strategies. This webinar provides a comprehensive overview of AI and its role in cybersecurity, offering expertise for evaluating AI-based cybersecurity tools and vendors.
Posted: 23 Jun 2020 | Premiered: 11 Jun 2020

Spin Tech

Cybersecurity Evolved: The Sophos Business Impact
sponsored by Sophos
CASE STUDY: Improvements to cybersecurity often rely on an increase in IT resources, which most organizations are unable to fulfill. This collection of 5 Sophos customer success stories illustrates how organizations may be able to strengthen threat protection and efficiency without adding headcount. Read on to discover how.
Posted: 23 Jun 2020 | Published: 23 Jun 2020

Sophos

The Rise of Enterprise Ransomware
sponsored by Sophos
WHITE PAPER: Ransomware attacks have recently seen a pattern shift towards larger enterprises – but why? This white paper further examines the ransomware threat landscape, including key threats to keep an eye on and critical security technologies organizations should include to protect themselves.
Posted: 23 Jun 2020 | Published: 23 Jun 2020

Sophos

How Capsule8 Protects Containerized Environments
sponsored by Capsule8
PRODUCT OVERVIEW: When it comes to containerized environments, it’s often thought that isolation equals security. This isn’t the case – if the host is compromised, then the hacker can access any container on the host. Download this solution brief to learn more about how Capsule8 protects containerized environments from runtime threats to security and performance.
Posted: 22 Jun 2020 | Published: 22 Jun 2020


MITRE ATT&CK Evaluations — APT29
sponsored by Trend Micro
WHITE PAPER: In addition to their framework enabling organizations to learn about common cyberattacks, MITRE ATT&CK also offers an evaluation service in which they assess an organization’s security posture against simulated versions of known attacks. Download this white paper for an in-depth look at Trend Micro’s evaluation results.
Posted: 22 Jun 2020 | Published: 21 Apr 2020

Trend Micro

How the Cognito platform replaces IDS and enables organizations to detect intrusions again
sponsored by Vectra AI
WHITE PAPER: While intrusion detection systems (IDS) and intrusion prevention systems (IPS) have long been a staple in incident response strategies, the modern threats that target today’s organizations require a new approach – perhaps one that leverages automation an AI. Read this white paper for more about defining the next generation of IDS.
Posted: 18 Jun 2020 | Published: 18 Jun 2020

Vectra AI
1 - 25 of 124 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info