IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Detection

RSS Feed   
ALSO CALLED: Host Intrusion Detection, Network Intrusion Detection, Host IDS, Network IDS, Network Intrusion Management, ID
DEFINITION: Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks. In HIDS, anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet. In NIDS, anti-threat software is installed  … 

Intrusion Detection definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Intrusion Detection Reports
1 - 25 of 150 Matches Previous Page  |  Next Page
Unlock the Value of Your AWS CloudTrail Data
sponsored by Lacework
PRODUCT OVERVIEW: As business environments become increasingly complex, threat detection becomes a daunting task. To help overburdened security analysts, Lacework designed a platform to detect anomalies and potential threats within your network, providing you with contextual behavioral analytics. Download this solution brief to learn more about the platform.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Lacework

Light Agent or Agentless
sponsored by Kaspersky Lab
PRODUCT OVERVIEW: Virtual environments require a cybersecurity approach that goes beyond the scope of traditional systems. Download this features guide for an in-depth look at Kaspersky Security for Virtualization, an advanced network protection offering designed to improve threat detection speeds while offering the scalability needed for modern environments.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

Kaspersky Lab

Transforming Detection and Response: A SANS Review of Cortex XDR
sponsored by Palo Alto Networks
ANALYST REPORT: Cortex XDR is a platform designed to help organizations detect and respond to threats. It brings multiple data sources together to assist analysts in performing enterprise investigations. This SANS report found that organizations looking for a holistic view of their environment would benefit from the correlation/response capabilities of Cortex XDR.
Posted: 29 Jun 2020 | Published: 30 Apr 2020

Palo Alto Networks

Stop targeted attacks and data loss on Exchange
sponsored by Armorblox
PRODUCT OVERVIEW: While email is rapidly moving towards the cloud, most organizations opt for on-premise or hybrid deployments. Unfortunately, cloud-based email security solutions are often ill-equipped to protect hybrid inboxes. Download this solution brief to learn more about a cloud email security platform designed to stop targeted attacks and data loss.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

Armorblox

MITRE ATT&CK Framework Q&A with Forrester Research
sponsored by Capsule8
WHITE PAPER: In response to the growing popularity and adoption of the MITRE ATT&CK framework, John Zelonis, principal analyst at Forrester Research, provides answers to commonly asked questions and offers further insight into the MITRE ATT&CK framework, including: Who should use the framwork, where priorities should begin & how it falls short.
Posted: 25 Jun 2020 | Published: 24 Jun 2020


Managed Detection and Response (MDR+)
sponsored by BlueVoyant
PRODUCT OVERVIEW: As threat detection, isolation and mitigation becomes increasingly complex, organizations look to third-party vendors for managed detection and response tools and capabilities. This solution brief highlights the key capabilities of at BlueVoyant’s Managed Detection and Response (MDR+) for Microsoft Defender ATP – read on to unlock the features.
Posted: 25 Jun 2020 | Published: 23 Jun 2020

BlueVoyant

Artificial Intelligence in Cybersecurity
sponsored by Spin Tech
VIDEO: Given the nature of artificial intelligence, it’s no surprise to see organizations integrating AI capabilities into their cybersecurity strategies. This webinar provides a comprehensive overview of AI and its role in cybersecurity, offering expertise for evaluating AI-based cybersecurity tools and vendors.
Posted: 23 Jun 2020 | Premiered: 11 Jun 2020

Spin Tech

Cybersecurity Evolved: The Sophos Business Impact
sponsored by Sophos
CASE STUDY: Improvements to cybersecurity often rely on an increase in IT resources, which most organizations are unable to fulfill. This collection of 5 Sophos customer success stories illustrates how organizations may be able to strengthen threat protection and efficiency without adding headcount. Read on to discover how.
Posted: 23 Jun 2020 | Published: 23 Jun 2020

Sophos

The Rise of Enterprise Ransomware
sponsored by Sophos
WHITE PAPER: Ransomware attacks have recently seen a pattern shift towards larger enterprises – but why? This white paper further examines the ransomware threat landscape, including key threats to keep an eye on and critical security technologies organizations should include to protect themselves.
Posted: 23 Jun 2020 | Published: 23 Jun 2020

Sophos

How Capsule8 Protects Containerized Environments
sponsored by Capsule8
PRODUCT OVERVIEW: When it comes to containerized environments, it’s often thought that isolation equals security. This isn’t the case – if the host is compromised, then the hacker can access any container on the host. Download this solution brief to learn more about how Capsule8 protects containerized environments from runtime threats to security and performance.
Posted: 22 Jun 2020 | Published: 22 Jun 2020


MITRE ATT&CK Evaluations — APT29
sponsored by Trend Micro
WHITE PAPER: In addition to their framework enabling organizations to learn about common cyberattacks, MITRE ATT&CK also offers an evaluation service in which they assess an organization’s security posture against simulated versions of known attacks. Download this white paper for an in-depth look at Trend Micro’s evaluation results.
Posted: 22 Jun 2020 | Published: 21 Apr 2020

Trend Micro

How the Cognito platform replaces IDS and enables organizations to detect intrusions again
sponsored by Vectra AI
WHITE PAPER: While intrusion detection systems (IDS) and intrusion prevention systems (IPS) have long been a staple in incident response strategies, the modern threats that target today’s organizations require a new approach – perhaps one that leverages automation an AI. Read this white paper for more about defining the next generation of IDS.
Posted: 18 Jun 2020 | Published: 18 Jun 2020

Vectra AI

2020 SANS Network Visibility and Threat Detection Survey
sponsored by ExtraHop
WHITE PAPER: Today’s networks – which embrace cloud, encryption, IoT and third-party vendor access – are becoming more complex, making visibility and security difficult. The following SANS report provides an in-depth look at the results from a recent network visibility and threat detection survey. Read on to view current trends and challenges.
Posted: 18 Jun 2020 | Published: 18 Jun 2020

ExtraHop

Market Guide for Network Detection and Response
sponsored by Vectra AI
RESOURCE: In this Gartner report, take a closer look at the crowded network detection and response (NDR) market, and discover an overview of current offerings, key vendors, and strategic recommendations. Read on to get started.
Posted: 17 Jun 2020 | Published: 11 Jun 2020

Vectra AI

The Ransomware-as-a-Service Evolution Is Here, with Its Sights on Your Mainframe
sponsored by BMC
WHITE PAPER: The latest iteration of ransomware, known as Ransomware-as-a-service (RaaS), provides hackers with access to ransomware resources in exchange for sending a portion of each ransom to the malware programmer. So, what proactive steps can organizations take against ransomware groups? Read this white paper to find out.
Posted: 10 Jun 2020 | Published: 10 Jun 2020

BMC

Indicators of Compromise and Why It Takes Six-Plus Months to ID a Breach
sponsored by BMC
WHITE PAPER: Each year, cybercriminals find novel ways to bypass existing security measures and disrupt workflows. In order to effectively protect sensitive data, security approaches need to be an endless, ongoing effort as well. But identifying the indicators of an attack or compromise is tricky. Download this white paper for tips to get started.
Posted: 10 Jun 2020 | Published: 10 Jun 2020

BMC

Why IDS is Ineffective for Linux Production Environments
sponsored by Capsule8
WHITE PAPER: While intrusion detection systems (IDS) may have been a core component in traditional security strategies, they lack the scalability, agility and visibility to keep up with today’s fast-paced cyberattacks. Download this white paper to discover 9 ways IDS in no longer a viable security option and how to detect threats in modern environments.
Posted: 08 Jun 2020 | Published: 08 Jun 2020


Essential Elements of a Penetration Test
sponsored by Synack
WHITE PAPER: A recent study from the White House indicated that cyberattacks cost the economy between $57 and $109 billion. In order to avoid the financial, legal and reputational damage of an attack, organizations are looking to penetration tests. In this white paper, discover why penetration tests are so critical and the emergence of crowdsource testing.
Posted: 27 May 2020 | Published: 27 May 2020

Synack

All Good Remediation Strategies Begin with Collaboration
sponsored by Vulcan
RESOURCE: As cyberattacks grow more frequent as a result of environments becoming more complex, it’s more important than ever for disparate security efforts to be unified under a cohesive strategy. This blog post highlights the benefits of a collaborative remediation approach and offers best practices for cultivating a collaborative remediation culture.
Posted: 27 May 2020 | Published: 06 Apr 2020

Vulcan

Hack the Pentagon Case Study
sponsored by Synack
CASE STUDY: The goal of the Department of Defense’s recent “Hack the Pentagon” program was to mimic realistic cyber threats and assess their critical systems responded to attack from nation states. Read on to unlock the results of this case study and discover why crowdsourced security testing is the new standard for the government.
Posted: 26 May 2020 | Published: 31 Oct 2018

Synack

The Synack Value
sponsored by Synack
DATA SHEET: As business environments become more complex, traditional penetration testing becomes unable to protect against today’s threats. To address this issue, Synack developed a ‘smart’ penetration testing platform, which combines crowdsourced human talent with AI. Download this data sheet to learn more and see how it compares to traditional pen testing.
Posted: 22 May 2020 | Published: 22 May 2020

Synack

Runtime Memory Analysis: A Better Way Forward for Vulnerability Management
sponsored by Rezilion
WHITE PAPER: According to the IDC, large-to-very large enterprises spend 7-10% of their security budget on vulnerability management. However, firms with strong security are equally breached by known vulnerabilities as those with poor security posture. So, what is the best way to approach vulnerability prioritization? Download this white paper to find out.
Posted: 22 May 2020 | Published: 22 May 2020

Rezilion

The Problem with CVSS Scores & What It Means for Vulnerability Management
sponsored by Vulcan
RESOURCE: While CVSS scores are a helpful way to demonstrate and share information about the severity of a vulnerability, it’s not viable as a standalone prioritization tool. In this article, observe an overview of the shortcomings of CVSS scoring as a risk management tool and best practices for using it appropriately.
Posted: 21 May 2020 | Published: 02 May 2019

Vulcan

Your Guide to Mastering Vulnerability Remediation
sponsored by Vulcan
RESOURCE: In order to preemptively contain threats, today’s organizations must have policies, processes and tools in place in order to adequately detect and assess vulnerabilities. This article highlights 8 best practices your organization can take to overcome the common barriers to implementing effective vulnerability remediation. Read on to get started.
Posted: 21 May 2020 | Published: 06 May 2020

Vulcan

Rain Financial Case Study
sponsored by Synack
CASE STUDY: In this case study, follow Rain Financial, a digital currency exchange partner in the Middle East, as they embark on a journey to identify, remediate and proactively protect against vulnerabilities that threaten the security of their customers’ data.
Posted: 21 May 2020 | Published: 21 May 2020

Synack
1 - 25 of 150 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info