IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Detection

RSS Feed   
ALSO CALLED: Host Intrusion Detection, Network Intrusion Detection, Host IDS, Network IDS, Network Intrusion Management, ID
DEFINITION: Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks. In HIDS, anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet. In NIDS, anti-threat software is installed  … 

Intrusion Detection definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Intrusion Detection Reports
1 - 25 of 116 Matches Previous Page  |  Next Page
How to Budget for Managed Detection and Response: A 6-step Guide for IT Security
sponsored by CI Security
WHITE PAPER: As a security leader, one of the biggest challenges is acquiring adequate security tools while staying under budget. Too often, sacrifices are made, leading to potential security gaps. This guide highlights 6 steps you should take when crafting a budget proposal for acquiring a managed detection & response tool Read on to get started.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

CI Security

What Makes A Standalone IPS So Effective?
sponsored by Trend Micro
WHITE PAPER: In this white paper, explore the guiding principles security researchers need to follow when designing and developing effective vulnerability filters, with examples of how these filters can be used by an IPS to detect and block the latest threats.
Posted: 12 Mar 2020 | Published: 01 Oct 2019

Trend Micro

What Buyers Need to Know before Investing in Managed Detection and Response (MDR)
sponsored by Dell SecureWorks
WEBCAST: This webinar helps to make sense of the noisy market of managed detection and response (MDR) solutions and share IDC’s unbiased views and data points. It also includes information on Secureworks’ MDR offering. View the webinar to learn about the trends shaping the dynamic MDR market today.
Posted: 11 Mar 2020 | Premiered: Mar 11, 2020

Dell SecureWorks

Implementer’s Guide to Deception Technologies
sponsored by Fidelis
WHITE PAPER: Download this white paper to learn how deception technologies can significantly improve an organization’s ability to quickly and accurately detect attackers while collecting sufficient threat intelligence and attack attribution information to improve response effectiveness.
Posted: 10 Mar 2020 | Published: 10 Mar 2020

Fidelis

Why Behavior-Based Network Traffic Analysis (NTA) Matters
sponsored by IronNet
WHITE PAPER: Today’s security executives are looking to shore up their defenses with a more proactive approach — one that can signal unknown threats steps ahead of the impact. Behavioral analytics adds that level of sophistication to network traffic analysis (NTA). Learn how NTA can elevate your threat detection strategy overall.
Posted: 25 Feb 2020 | Published: 25 Feb 2020

IronNet

NIST Cybersecurity Framework Evaluation Guide
sponsored by Absolute Software Corporation
WHITE PAPER: The NIST Cybersecurity Framework (CSF) outlines specific actions and guidelines for organizations to undertake in order to improve security hygiene and meet regulatory requirements. In this evaluation guide, take a closer look at the 5 pillars of the NIST CST and learn how the Absolute platform aligns with the action items.
Posted: 20 Feb 2020 | Published: 02 Oct 2018

Absolute Software Corporation

Security at the Speed of Your Network
sponsored by Gigamon
WHITE PAPER: Read “Security at the Speed of Your Network” to learn how to use an architectural approach that improves security posture and reduces costs without painful compromises on performance.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Gigamon

Core - DNS - The Role of Predictive Intelligence in the Fight against Cyberattacks
sponsored by Cisco Umbrella
WHITE PAPER: The reactive nature of threat intelligence makes it difficult for organizations to keep pace with the increasing frequency of modern attacks. In this white paper, take a closer look at predictive intelligence and how you can monitor live activity to better anticipate when and where and attack will strike.
Posted: 05 Feb 2020 | Published: 05 Feb 2020

Cisco Umbrella

ThreatQ for Government Agencies
sponsored by ThreatQuotient
DATA SHEET: As government agencies are considered critical infrastructure, they are under constant attack from hackers, political activists and foreign state-sponsored actors. The first step to detecting, responding and recovering from incidents is finding a way to increase situation awareness. Download this brief to learn more.
Posted: 21 Jan 2020 | Published: 21 Jan 2020

ThreatQuotient

2018 Global Study on Application Security
sponsored by Arxan
RESEARCH CONTENT: Ponemon Institute conducted a survey to understand the risk that unprotected applications pose to businesses when running in unsecured environments and how organizations are addressing this risk in practice. In this research report, learn about key findings from the survey.
Posted: 31 Dec 2019 | Published: 31 May 2018

Arxan

Building a Strong and Effective Incident Response Plan
sponsored by ServiceNow
EGUIDE: Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.
Posted: 28 Oct 2019 | Published: 23 Oct 2019

ServiceNow

The Benefits of Automating Security with SOAR Tools
sponsored by ServiceNow
EGUIDE: Security professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

ServiceNow

How to Improve Your Security Incident Response Process
sponsored by ServiceNow
EGUIDE: Nearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

ServiceNow

Evaluation Criteria for Choosing an ICS Cybersecurity Monitoring System
sponsored by Claroty
WHITE PAPER: A rapidly changing threat landscape, combined with convergence between traditional IT and industrial control networks is having a dramatic impact on the risk to industrial control systems. In this white paper, explore key criteria leading organizations are using to evaluate and select an appropriate monitoring system for industrial networks.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Claroty

Why Should I Care About SSL/TLS Decryption?
sponsored by Gigamon
WEBCAST: On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. In this webcast, Druce McFarlane, Director of Product Management at Gigamon, discusses how TLS/SSL encryption has become a threat vector, and how to make sure your detection tools are working at their greatest capacity.
Posted: 24 Sep 2019 | Premiered: Sep 24, 2019

Gigamon

The State of Detection Report 2019
sponsored by Fidelis
ANALYST REPORT: Cybersecurity hasn't gotten any easier. That should hardly be a revelation to security professionals in the field, who every year are seeing their cyber terrain grow larger and larger. In The State of Threat Detection Report 2019, explore Fidelis' findings from a survey of 300 cybersecurity professional on key cybersecurity challenges.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Fidelis

Fidelis Deception Demo
sponsored by Fidelis
WEBCAST: Download this video for an overview of Fidelis Deception. In the video, you'll learn how to use Fidelis to map your network and understand your terrain, how to deploy deception and more.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

Fidelis

The First 72-Hours: How to Approach the Initial Hours of a Security Incident
sponsored by Fidelis
WHITE PAPER: Over the course of responding to thousands of critical security incidents, Fidelis Security has seen organizations approach the initial hours of an incident in every conceivable way. In this white paper, discover the 1st steps security teams should take when responding to an incident.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Fidelis

Fidelis Endpoint : A Technical Deep Dive
sponsored by Fidelis
PRODUCT OVERVIEW: In this solution overview, learn how Fidelis Endpoint unifies endpoint detection and response (EDR) and endpoint protection platform (EPP) capabilities to meet the needs of IT endpoint management and mature security operations.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Fidelis

Incident Response: Your How-To Guide
sponsored by Farsight Security
EGUIDE: As the rate of cybersecurity incidents grows, security teams are looking for all the help they can get to prevent, detect and respond to attacks. Incident response can help. Download this e-guide to learn how your organization can build an incident response framework, how and when to use incident response tools, and more.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Farsight Security

MDR Buyer's Guide
sponsored by Arctic Wolf Networks, Inc.
EBOOK: Managed detection and response (MDR) is an increasingly popular approach that addresses security monitoring challenges, as it delivers real-time, 24/7 managed detection and response using a holistic, turnkey approach. Download this buyer's guide for key features you should look for in an MDR service.
Posted: 08 Aug 2019 | Published: 08 Aug 2019

Arctic Wolf Networks, Inc.

How Internet Isolation Eliminates Threats That Evade Sandboxes
sponsored by Menlo Security
WEBCAST: Many organizations rely on a sandbox to protect against sophisticated email or malware threats. However, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. In this webinar, Vinay Pidathala will discuss these techniques and how to defend against them using Internet Isolation.
Posted: 25 Jul 2019 | Premiered: Jul 25, 2019

Menlo Security

Access & Protect Your Data – Anywhere, Anytime
sponsored by TITUS
WHITE PAPER: The explosion of data and complexity of regulatory governance have made data protection a moving target. In this white paper, learn how TITUS and Dataguise bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable data wherever it resides.
Posted: 15 May 2019 | Published: 15 May 2019

TITUS

4 Reasons to Add UBA to Your SIEM
sponsored by Splunk
WHITE PAPER: To combat threats, organizations traditionally have turned to SIEMs. However, more sophisticated use cases require a machine learning-powered solution. This is where user and entity behavior analytics (UEBA) can prove to be an invaluable addition to your SIEM. In this white paper, learn about 4 reasons to add UEBA to your SIEM.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk

2018 Incident Response Insights Report
sponsored by Dell SecureWorks
RESEARCH CONTENT: In Secureworks 2018 Security Leaders Survey, 43% of respondents said that regular threat hunting activities were part of their incident response program. Access this 29-page research report to uncover best practices and valuable lessons learned over the past year from real-world incidents.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

Dell SecureWorks
1 - 25 of 116 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info