IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Detection

RSS Feed   
ALSO CALLED: Host Intrusion Detection, Network Intrusion Detection, Host IDS, Network IDS, Network Intrusion Management, ID
DEFINITION: Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks. In HIDS, anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet. In NIDS, anti-threat software is installed  … 

Intrusion Detection definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Intrusion Detection Reports
1 - 25 of 136 Matches Previous Page  |  Next Page
Endpoint Zero Trust Protection in a Connected World
sponsored by AppGuard
RESOURCE: In this resource, discover the security capabilities of AppGuard and how your organization could benefit from its zero-trust protection strategy.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

AppGuard

Managed Detection and Response vs. Managed Security Services: The Difference and How to Choose
sponsored by MASERGY
WHITE PAPER: The world of managed security services is expanding with Managed Detection and Response (MDR) services. This new approach is designed to accelerate threat discovery and response time, but what is MDR? How is it different from managed security service providers (MSSPs)? In this white paper, learn about the differences between MDR and MSSPs.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

MASERGY

Modern Incident Response: The Definitive Guide
sponsored by PagerDuty
WHITE PAPER: In this guide, discover incident best practices, and capabilities you can leverage to embed those best practices into your response process today.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

PagerDuty

Effective Incident Response Planning Could Save You Millions
sponsored by Arctic Wolf
WHITE PAPER: As companies like Equifax, Verizon Wireless, and Anthem know all too well, it's not a matter of if, but when there will be a breach. Are you prepared to deal with an attack? In this white paper, learn how AWN CyberSOC for IR can help your organization swiftly detect and address your next (inevitable) data breach.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

Arctic Wolf

Managed Detection and Response
sponsored by Trend Micro, Inc.
RESOURCE: As attackers become more sophisticated, enterprises must turn to advanced detection and response capabilities. Correlating threats to get a complete picture of a targeted attack is an effective detection strategy. However, the shortage in cybersecurity skills causes enterprises struggle with this. In this resource, learn how Trend Micro can help.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

Trend Micro, Inc.

Deploy Symantec Cloud Workload Protection for Storage
sponsored by Symantec
EBOOK: As organizations generate increasing amounts of information, they need to securely collect, store, and rapidly analyze this data. In this eBook, learn how Cloud Workload Protection for Storage can help your organization implement a robust security strategy that will enhance the protection of your stored data from malware and threats.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Symantec

Bridging Cybersecurity Gaps with Managed Detection and Response
sponsored by Trend Micro, Inc.
RESOURCE: Managed detection and response (MDR) enables a proactive approach to security with its ability to detect and fully analyze threats and promptly respond to incidents. With the complexity of today's threats the stakes are high. In this resource, look at how MDR can face cybersecurity challenges.
Posted: 26 Feb 2019 | Published: 02 Oct 2018

Trend Micro, Inc.

Surrey Satellite Technology Enhances Ground Operations With Real-Time Infrastructure Visibility
sponsored by Splunk Services UK Ltd
CASE STUDY: Surrey Satellite Technology (SSTL) is a provider of operational and commercial satellites. SSTL required a solution that would ensure their engineers and researches had secure access to the IT tool they needed. In order to do this, SSTL implemented Splunk. In this case study, learn about the benefits SSTL saw after deploying Splunk.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

Splunk Services UK Ltd

Vitria's Chris Menier Discusses How Artificial Intelligence, Machine Learning and Internet of Things is Creating a New Generation of Incident Response Strategies
sponsored by Vitria Technology, Inc.
RESOURCE: As AI, ML and IoT technologies converge; organizations are shifting the focus of Incident Response Lifecycle Management (IRLM) to place greater emphasis on monitoring and improving the customer experience. In this resource, Vitria's Vice President, Chris Menier discusses transformative IRLM.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

Vitria Technology, Inc.

How Artificial Intelligence, Machine Learning and Internet of Things is Creating a New Generation of Incident Response Strategies
sponsored by Vitria Technology, Inc.
RESOURCE: Organizations are shifting the focus of incident response lifecycle management to place greater emphasis on monitoring and improving the customer experience. In this Q&A, Chris Menier, Vice President of Vitra, offers insight into the strategic investments and the industry requirements for next-generation incident response strategies.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

Vitria Technology, Inc.

Splunk Security Use Case Detecting Unknown Malware and Ransomware
sponsored by Splunk Services UK Ltd
WHITE PAPER: This white paper will take users on a step-by-step journey through how to detect malware activity and early signs of compromise in a Windows environment.
Posted: 20 Feb 2019 | Published: 20 Feb 2019

Splunk Services UK Ltd

Security Investigation, Detection & Rapid Response with Splunk Enterprise
sponsored by Splunk Services UK Ltd
WHITE PAPER: Investigation and rapid response is critical for day-to-day alert handling. The faster a threat and its impact can be detected and investigated, the faster an organization can take action. In this white paper, learn about how the Splunk platform enables organizations to understand their potential security threats and take the necessary actions.
Posted: 20 Feb 2019 | Published: 20 Feb 2019

Splunk Services UK Ltd

Operationalizing Threat Intelligence Using Splunk® Enterprise Security
sponsored by Splunk Services UK Ltd
WHITE PAPER: Threat intelligence can provide critical security perspectives needed to inform an organization about current threats and to help develop a strategy against future threats. In this white paper, learn about the challenges and requirements of implementing high-coverage threat intelligence.
Posted: 19 Feb 2019 | Published: 19 Feb 2019

Splunk Services UK Ltd

The Seven Essential Capabilities of an Analytics-Driven SIEM
sponsored by Splunk Services UK Ltd
WHITE PAPER: There is no shortage of options for storing data. Collecting all security relevant data and turning all that data into actionable intelligence, however, is a whole other matter. An analytics-driven SIEM allows IT to monitor threats and respond quickly to incidents. In this white paper, discover 7 essential capabilities of an analytics-driven SIEM.
Posted: 19 Feb 2019 | Published: 19 Feb 2019

Splunk Services UK Ltd

UCAS Secures Millions of University Applications With Splunk Enterprise Security Analytics
sponsored by Splunk Services UK Ltd
CASE STUDY: The Universities and Colleges Admissions Service (UCAS) is the U.K.'s shared admissions service for higher education. They host a complex flow of sensitive, personal data. Therefore, it is important that they deliver faultless security assurance. In this case study, learn how UCAS was able to meet these security needs by adopting Splunk.
Posted: 18 Feb 2019 | Published: 18 Feb 2019

Splunk Services UK Ltd

Definitive Guide to SOAR 2019
sponsored by LogRhythm, Inc.
EBOOK: Today's cyberattackers are more formidable and sophisticated than ever before. As a result, organizations are adjusting their focus to include rapid detection and response. The faster they can detect and respond to threats, the lower the risk of threats. In this eBook, learn how to work accurately and quickly when your corporation is at risk.
Posted: 18 Feb 2019 | Published: 18 Feb 2019

LogRhythm, Inc.

Travis Perkins PLC Adopts Analytics-Driven SIEM to Enable Hybrid Cloud Transition
sponsored by Splunk Services UK Ltd
CASE STUDY: Travis Perkins PLC's existing SIEM solution couldn't provide the necessary security insights across its hybrid environment. They reviewed the alternatives available and selected the Splunk platform as their new SIEM. In this case study, discover the benefits that Travis Perkins PLC has seen since deploying the Splunk platform.
Posted: 14 Feb 2019 | Published: 14 Feb 2019

Splunk Services UK Ltd

2018 Global Study on Application Security
sponsored by Arxan
RESEARCH CONTENT: Ponemon Institute conducted a survey to understand the risk that unprotected applications pose to businesses when running in unsecured environments and how organizations are addressing this risk in practice. In this research report, learn about key findings from the survey.
Posted: 14 Feb 2019 | Published: 31 May 2018

Arxan

5 Identity Pitfalls to Avoid
sponsored by Onfido
RESOURCE: Identity theft accounts for half of all reported fraud in the UK. And if you fail to catch that fraud, the cost to your business – both reputational and financial – can be catastrophic. Do you know the 5 most common identity pitfalls that businesses fall afoul of – and crucially, how to avoid them?
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

How to Detect the 7 Types of Document and Identity Fraud
sponsored by Onfido
WHITE PAPER: Forgeries. Imposters. Counterfeit documents. You can't afford to let fake identities slip through the cracks and put your company—and your customers—at risk. Learn how to detect the 7 most common types of ID fraud, and how advanced identity verification technology can turn things around.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

A Guide to Digital Identity Verification: The Technology and Trends
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

How to Combat Fraud in 3 Easy Steps
sponsored by Onfido
WHITE PAPER: Identity theft is the fastest growing crime in the US and accounts for half of all reported fraud in the UK, with 1 in 60 online transactions attempted globally being fraudulent. This white paper looks at 7 ways fraudsters are slipping through the net, what to watch out for and how to combat fraud in 3 simple steps.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

2018 Incident Response Insights Report
sponsored by Dell SecureWorks
RESEARCH CONTENT: In Secureworks 2018 Security Leaders Survey, 43% of respondents said that regular threat hunting activities were part of their incident response program. Access this 29-page research report to uncover best practices and valuable lessons learned over the past year from real-world incidents.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

Dell SecureWorks

How Security Ratings Improve Risk Awareness While Delivering a Solid ROI
sponsored by Security Scorecard
WHITE PAPER: Combatting cybersecurity risk is a difficult challenge. Without visibility into internal and external risk, this battle becomes even harder. In this white paper, learn how security ratings offer critical insight into vulnerabilities presented both in your environment and the environment of third-parties.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

Security Scorecard

What to Look for in an MDR Provider
sponsored by Dell SecureWorks
WHITE PAPER: There are plenty of security providers offering Managed Detection and Response (MDR) solutions, but it is important to ensure they offer capabilities that match your business's needs. In this white paper, learn 5 key areas organizations should investigate when evaluating and selecting an MDR provider.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

Dell SecureWorks
1 - 25 of 136 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement