IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Detection

RSS Feed   
ALSO CALLED: Host Intrusion Detection, Network Intrusion Detection, Host IDS, Network IDS, Network Intrusion Management, ID
DEFINITION: Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks. In HIDS, anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet. In NIDS, anti-threat software is installed  … 

Intrusion Detection definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Intrusion Detection Reports
1 - 25 of 188 Matches Previous Page  |  Next Page
Critical Watch Report: The State of Threat Detection 2018
sponsored by Alert Logic
RESEARCH CONTENT: High-profile data breaches continue to make headlines, but the real news is the dramatic increase in volume and the intensity of cyberattacks it now affecting organizations of all sizes and types. Learn how your organization can keep up with the fast-moving threat landscape with 5 key security insights.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

Alert Logic

Intelligent Orchestration
sponsored by IBM Resilient
WHITE PAPER: Explore how Intelligence Orchestration platforms blend incident response, intelligence, orchestration and automation to drive improved security operations and incident response for organizations, today.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

IBM Resilient

Armor File Integrity Monitoring (FIM)
sponsored by Armor
RESOURCE: Download this resource to learn about an additional layer of security that can protect your cloud, on-premise, hybrid, or hosted IT environment from threats.
Posted: 20 Nov 2018 | Published: 20 Nov 2018

Armor

Intrusion Detection Systems (IDS)
sponsored by Armor
WHITE PAPER: In this white paper, learn about 2 different Intrusion Detection Systems (IDS) that can analyze and correlate all security events, and trigger further investigation by a Security Operations Center when necessary.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Armor

The State of IT Incident Response in Financial Services
sponsored by EverBridge Inc.
WHITE PAPER: Discover how companies in the financial services sector perform when it comes to their security incidents that make national headlines.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

EverBridge Inc.

SECaaS is Here: Everything you Need to Know
sponsored by Armor
WHITE PAPER: SECaaS, or security-as-a-service, can help organizations like yours, defend against advanced threats, detect intruders, and more. Read on to learn the details.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Armor

The Confidence Game: How to Build a People-centric Cybersecurity Strategy
sponsored by Proofpoint, Inc.
VIDEO: Learn how your organization can take a people-centric approach to security and find out how humans are increasingly becoming the #1 target for cyberattacks.
Posted: 30 Oct 2018 | Premiered: 29 Oct 2018

Proofpoint, Inc.

Automating Incident Response
sponsored by Swimlane
WHITE PAPER: Staying on top of thousands of security alerts every day is exhausting for a cybersecurity team and missing even one incident can contribute to risk exposure. Learn how automated incident response and security orchestration can help alleviate these issues for your security team, today.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Swimlane

Considerations for EDR Adoption
sponsored by Bitdefender
RESEARCH CONTENT: Navigate through the issues surrounding endpoint detection response (EDR), explore the business value of its adoption, and learn recommendations for the range of considerations and next steps in the decision-making process. Download to learn more.
Posted: 10 Oct 2018 | Published: 30 Sep 2018

Bitdefender

How to Protect Privileged Accounts with an Incident Response Plan
sponsored by Thycotic
RESOURCE: Today, cybercriminals can create a blueprint of the entire network and operations. Discover the telltale indicators you're under attack and the plans you need to have in place to protect your privileged accounts.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

Thycotic

An ESG Research Insights Report: Security Operations Challenges, Priorities, and Strategies
sponsored by Siemplify
RESEARCH CONTENT: This report on security operations issues offers suggestions to address these problems from cybersecurity professionals themselves.
Posted: 26 Sep 2018 | Published: 31 Mar 2017

Siemplify

The Impact of Security Automation on Enterprise IT
sponsored by Juniper Networks
EGUIDE: The use of security automation and orchestration systems is on the rise, due to their ability to provide automatic responses to threats. Learn how SAO and automated incident response can benefit security in the cloud and in your enterprise.
Posted: 21 Sep 2018 | Published: 19 Sep 2018

Juniper Networks

7 Experts on Security Automation and Analytics
sponsored by Juniper Networks
EBOOK: In this e-book, 7 cybersecurity experts share their insights, strategies, and best practices surrounding security automation and analytics. Learn how their takeaways can help you overcome some of the complexities associated with security automation and analytics, today.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Juniper Networks

University of Oklahoma Case Study
sponsored by Empow Cyber Security
CASE STUDY: In this case study, learn how The University of Oklahoma overcame its biggest security and compliance struggles after implementing a new SIEM platform.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Empow Cyber Security

5 Top Recommendations for Effective Threat Detection
sponsored by Alert Logic
RESOURCE: If your organization is looking to improve the effectiveness of your threat detection program, uncover the top 5 recommendations for effective threat detection, today.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

Alert Logic

Threat Monitoring, Detection and Response
sponsored by Alert Logic
RESEARCH CONTENT: Information security teams worldwide are increasingly concerned about the rapid growth of cyberthreats. To address this concern, a survey was conducted to explore the perspectives of cybersecurity professionals on several important threat lifecycle topics. Download this report for a comprehensive snapshot into the key survey findings.
Posted: 28 Aug 2018 | Published: 28 Aug 2018

Alert Logic

Cryptojacking Attacks May Not Challenge Ransomware Dominance
sponsored by Cisco Umbrella
EGUIDE: Cryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.
Posted: 28 Aug 2018 | Published: 12 Apr 2018

Cisco Umbrella

2018 Annual Cybersecurity Report At-A-Glance: Cloud Security
sponsored by Cisco Umbrella
RESEARCH CONTENT: The Cisco 2018 Annual Cybersecurity Report for Cloud Security examines the techniques and strategies that adversaries use to break through defenses and evade detection. Get the at-a-glance report for cloud security.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Cisco Umbrella

Network DLP Buyer's Guide
sponsored by Fidelis
ESSENTIAL GUIDE: Download this DLP buyer's guide for everything your organization should be aware of when approving a Network DLP approach to meet modern day security challenges.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Fidelis

How to Prevent Cloud Cryptojacking Attacks on your Enterprise
sponsored by Cisco Umbrella
EGUIDE: Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.
Posted: 24 Aug 2018 | Published: 31 May 2018

Cisco Umbrella

Advanced Endpoint Protection
sponsored by NSS Labs
EBOOK: In this product analysis by NSS Labs, learn how you can detect, prevent, and continuously monitor threats, with the right advanced endpoint protection approach for your organization.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

NSS Labs

The State of the SOC: An Enterprise Study on Threat Detection and Response
sponsored by Fidelis
RESEARCH CONTENT: Today, many Security Operations Centers (SOCs) are highly targeted by cybercriminals and their security analysts are being overwhelmed. Download this report to gain insights on the specific challenges faced in the SOC.
Posted: 21 Aug 2018 | Published: 31 Mar 2018

Fidelis

Capture the Flag with Deception Defenses
sponsored by Fidelis
WHITE PAPER: Deception — the use of decoys, traps, lures and other mechanisms — is quickly gaining the attention of organizations seeking an efficient post-breach detection technology. Learn how your organization can be a part of the cyberdeception trend to expose attacks as they happen.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

Fidelis

Basefarm: Scaling Intrusion Detection Systems with Big Monitor Fabric
sponsored by Big Switch Networks
CASE STUDY: Find out how a leading hosting provider for critical business apps used a modern Network Packet Broker (NPB) and a SDN-based monitoring architecture to extend their monitoring and security services across multiple data centers.
Posted: 19 Oct 2018 | Published: 19 Oct 2018

Big Switch Networks

Intelligent Orchestration
sponsored by IBM Resilient
WHITE PAPER: Learn how your organization can battle complex cyberattacks with this intelligent approach to incident response and security operations.
Posted: 10 Sep 2018 | Published: 10 Sep 2018

IBM Resilient
1 - 25 of 188 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement