IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Detection

RSS Feed   
ALSO CALLED: Host Intrusion Detection, Network Intrusion Detection, Host IDS, Network IDS, Network Intrusion Management, ID
DEFINITION: Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks. In HIDS, anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet. In NIDS, anti-threat software is installed  … 

Intrusion Detection definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Intrusion Detection Reports
26 - 50 of 133 Matches Previous Page  |  Next Page
Cybereason EDR
sponsored by Cybereason
DATA SHEET: Endpoint detection & response (EDR) allows organizations to monitor their environments with force, so they can know when a threat is present and respond in seconds, rather than days. Plus, it correlates an attack across all endpoints to give a single view of an attack in real time. View this data sheet to get a closer look at key capabilities.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Cybereason

Complete Endpoint Protection
sponsored by Cybereason
DATA SHEET: In today’s fast-paced and increasingly distributed business environment, protecting the growing population of endpoints from cyberthreats has become increasingly challenging. In this data sheet, discover the key capabilities of Cybereason’s endpoint protection platform and see if it aligns with your endpoint security strategy.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Cybereason

A web of weak spots: Securing your supply chain with NDR and Collective Defense
sponsored by IronNet
WHITE PAPER: Today’s supply chain is an extended enterprise with many back doors. Indirect attacks against weak links in the supply chain now account for 40% of security breaches. How can you better protect your data? Dig into this white paper to learn the 5 most common attacks and how network detection & response can help prevent them.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

IronNet

The 2020 State Of Security Operations
sponsored by Palo Alto Networks
WHITE PAPER: A successful data breach can have devastating impacts – from loss of data to loss of customer trust and potential litigation. This Forrester report aims to identify and understand the challenges facing security operations (SecOps) teams as they work to manage the growing threat of sophisticated data breaches.
Posted: 01 Sep 2020 | Published: 30 Apr 2020

Palo Alto Networks

XDR: Extended Detection and Response
sponsored by Palo Alto Networks
WHITE PAPER: Extended detection & response (XDR) has emerged in the wake of a need to detect, investigate and respond to threats across all threat vectors in a company’s infrastructure (network, endpoint and cloud) rather than just one. Dive into this white paper to learn about XDR and how it uses integration and orchestration as defense.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Palo Alto Networks

The Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation
sponsored by Palo Alto Networks
ANALYST REPORT: Endpoint detection and response (EDR) is quickly becoming a ubiquitous security technology in the age of remote work. As such, it is critical for security professionals to be aware of the vendors in the space. Tap into the Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation to help you pick the right tool for your organization.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

Cybereason MDR Packages
sponsored by Cybereason
DATA SHEET: Detection and response are vital to any organization’s security. With managed detection and response (MDR), you can efficiently prevent data breaches, eliminate false positives, and because it’s managed, you can optimize security operations and reduce total cost of ownership. Dive into this data sheet to learn about MDR from Cybereason.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Cybereason

Future of the SOC Forces shaping modern security operations
sponsored by Chronicle
WHITE PAPER: The age of AI, IoT, cloud computing and other disruptive technologies has driven fundamental change in security operations approaches and objectives. This white paper explores 3 fundamental forces that are shaping the need to change threat management and SOCs – read on to learn more.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

Chronicle

CipherTrust Data Discovery and Classification from Thales
sponsored by Thales
VIDEO: To meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.
Posted: 10 Aug 2020 | Premiered: 23 Mar 2020

Thales

SIG - Axcess Financial Customer Story
sponsored by Cisco Umbrella
CASE STUDY: In this case study, following the journey of Axcess Financial as they partner with Cisco to address issues they were facing related to incident detection, response and remediation. Read on to learn how they overcame these challenges and the benefits of their partnership.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

Cisco Umbrella

STEP 1: An Overview of Insider Threat Management
sponsored by Proofpoint
EBOOK: The average cost of an insider-caused cybersecurity incident has grown to $11.45 million – and these attacks are becoming more frequent, too. In this e-book, enhance your understanding of insider threats by looking at industry specific concerns, common use cases, the increasingly popular people-centric approach, and more.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Proofpoint

STEP 2: A Guide to Setting Up Your Insider Threat Management Program
sponsored by Proofpoint
EBOOK: In this past 2 years, the average cost of insider threats grew to a devastating $11.45 million per incident (the frequency also increased too). Download this e-book to learn more about the varying types of insider threats, how to set up an insider threat management program, best practices, and more.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Proofpoint

2020 Cost of Insider Threats Global report
sponsored by Proofpoint
WHITE PAPER: Each year, the Ponemon Institute conducts a study, known as the Cost of Insider Threats Global Report study, to dissect and examine the costs (direct and indirect) that result from insider threats. Download the report to explore the results of the 2020 study.
Posted: 09 Jun 2020 | Published: 09 Jun 2020

Proofpoint

Vulnerability Management 2020
sponsored by TechTarget
WHITE PAPER: Much like the cyberthreat landscape, vulnerability management approaches are constantly evolving to protect organizations against a never-ending onslaught of risks. This white paper exposes the limitations of traditional vulnerability management, and explores where vulnerability management needs to go to meet today’s security needs.
Posted: 20 May 2020 | Published: 31 Dec 2019

TechTarget

Justify Your Vulnerability Management Program
sponsored by TechTarget
WHITE PAPER: In this white paper, Vulcan compiled the results from several vulnerability management studies, conducted by organizations like Gartner, Ponemon, Verizon and more, to provide readers with a comprehensive set of key statistics and figures. Read on to unlock the findings.
Posted: 15 May 2020 | Published: 15 May 2020

TechTarget

Building a Strong and Effective Incident Response Plan
sponsored by ServiceNow
EGUIDE: Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.
Posted: 28 Oct 2019 | Published: 23 Oct 2019

ServiceNow

The Benefits of Automating Security with SOAR Tools
sponsored by ServiceNow
EGUIDE: Security professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

ServiceNow

How to Improve Your Security Incident Response Process
sponsored by ServiceNow
EGUIDE: Nearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

ServiceNow

Faster Response with Crowdstrike and Mitre Att&ck
sponsored by Crowdstrike
WHITE PAPER: As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

Crowdstrike

Forrester 2019 TEI Report
sponsored by BlackBerry
WHITE PAPER: To protect endpoints, servers, and cloud workloads, CylancePROTECT and CylanceOPTICS provide an AI-driven threat prevention, detection, and response platform. In this Forrester Total Economic Impact study, examine the potential ROI enterprises realize after deploying these Cylance platforms.
Posted: 26 Jun 2019 | Published: 31 May 2019

BlackBerry

Magic Quadrant for Endpoint Protection Platforms
sponsored by CrowdStrike
RESEARCH CONTENT: Endpoint protection is evolving to address more of Gartner's adaptive security architecture tasks such as hardening, investigation, incident detection, and incident response. In this research report, explore Gartner's magic quadrant which includes top vendors along with strengths and cautions for each.
Posted: 27 Mar 2019 | Published: 24 Jan 2018

CrowdStrike

The Forrester Wave: Endpoint Detection and Response, Q3 2018
sponsored by CrowdStrike
RESEARCH CONTENT: This Forrester Wave report evaluates Endpoint Detection and Response (EDR) providers. It also shows how different provides measure up and includes key takeaways from the research. Download the report, to discover the top 12 vendors based on a 20-criteria evaluation.
Posted: 27 Mar 2019 | Published: 05 Jul 2018

CrowdStrike

Cryptojacking Attacks May Not Challenge Ransomware Dominance
sponsored by Cisco Umbrella
EGUIDE: Cryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.
Posted: 28 Aug 2018 | Published: 12 Apr 2018

Cisco Umbrella

How to Prevent Cloud Cryptojacking Attacks on your Enterprise
sponsored by Cisco Umbrella
EGUIDE: Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.
Posted: 24 Aug 2018 | Published: 31 May 2018

Cisco Umbrella

The Future of Security: Advanced Security Analytics
sponsored by LogRhythm, Inc.
EGUIDE: As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.
Posted: 23 Nov 2016 | Published: 22 Nov 2016

LogRhythm, Inc.
26 - 50 of 133 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences